natenho / go-jira-migrateLinks
Migrate team-managed project issues between two JIRA Cloud accounts
☆11Updated 9 months ago
Alternatives and similar repositories for go-jira-migrate
Users that are interested in go-jira-migrate are comparing it to the libraries listed below
Sorting:
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆11Updated 2 years ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆15Updated 2 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Updated 4 years ago
- Fork of OpenSearch Dashboards Security Plugin.☆12Updated this week
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆18Updated last year
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆45Updated 2 weeks ago
- Wallarm Product Documentation☆11Updated this week
- PowerShell module containing a set of generally useful tools.☆17Updated last week
- Computer Network Exploitation (CNE) Field Manual☆14Updated last year
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Updated 3 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆25Updated 6 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆31Updated 2 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Publicly-available tools from Rogue Valley Information Security☆14Updated 6 months ago
- A Python script to find tenant id an region from a list of domain names.☆15Updated 6 months ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses☆12Updated 2 years ago