Puppet Guide
☆10Jan 2, 2022Updated 4 years ago
Alternatives and similar repositories for Puppet-Guide
Users that are interested in Puppet-Guide are comparing it to the libraries listed below
Sorting:
- Ansible Guide☆20Jan 9, 2022Updated 4 years ago
- HashiCorp Cloud Guide☆20Jan 23, 2022Updated 4 years ago
- VMware Guide☆14Dec 14, 2021Updated 4 years ago
- Python Guide☆33Jan 3, 2022Updated 4 years ago
- Terraform Guide☆31Jan 9, 2022Updated 4 years ago
- DevOps Guide☆16Jul 25, 2021Updated 4 years ago
- Cloud Native Guide☆21May 24, 2022Updated 3 years ago
- Linux Mint Guide☆59Mar 9, 2022Updated 3 years ago
- OpenStack Guide☆23Feb 1, 2022Updated 4 years ago
- macOS/iOS/iPadOS Guide☆27Feb 9, 2022Updated 4 years ago
- Docker Guide☆55Jan 3, 2022Updated 4 years ago
- Grafana Guide☆29Feb 8, 2022Updated 4 years ago
- Rocky Linux Guide☆31Jul 8, 2021Updated 4 years ago
- PyTorch Guide☆38Jan 3, 2022Updated 4 years ago
- Android Guide☆34Mar 18, 2022Updated 3 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Learn DevOps Helm/Helmfile Kubernetes deployment☆11May 13, 2020Updated 5 years ago
- ☆11Apr 10, 2023Updated 2 years ago
- ☆18Jan 22, 2026Updated last month
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Docker environment for running Ellucian Banner☆17Jan 13, 2026Updated last month
- Biostatistics Guide☆13Jul 20, 2021Updated 4 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- JavaScript Guide☆39Jan 4, 2024Updated 2 years ago
- Terraform module for workload identity federation on GCP.☆13Mar 26, 2024Updated last year
- CodeQL Guide☆11Jan 12, 2022Updated 4 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated last year
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Minimal local renderer for Helm template YAML, written in Python.☆12Oct 29, 2024Updated last year
- ACL (Access Control List) module☆19Updated this week
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- The F5 IPAM Controller runs in an orchestration environment like Kubernetes to allocate IP addresses from an IPAM system to BIG-IP Virtua…☆11Aug 7, 2025Updated 6 months ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Version 1.1 of my 8-bit, TTL computer.☆12Feb 6, 2025Updated last year
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago