natenho / go-jira-migrateLinks
Migrate team-managed project issues between two JIRA Cloud accounts
☆11Updated last year
Alternatives and similar repositories for go-jira-migrate
Users that are interested in go-jira-migrate are comparing it to the libraries listed below
Sorting:
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆12Updated 2 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 3 years ago
- ☆10Updated 10 months ago
- Some ELF Malwares☆10Updated 3 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Build wordlists from the common-crawl index☆12Updated 3 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Active Directory Password Spray Testing Utility in Go☆17Updated last year
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Updated 4 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- THOR APT Scanner User Manual☆20Updated last week
- ☆12Updated 3 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago