Infrastructure as Natural Language
☆46Oct 28, 2023Updated 2 years ago
Alternatives and similar repositories for salami
Users that are interested in salami are comparing it to the libraries listed below
Sorting:
- Authenticated Byzantine gossip protocol☆13Sep 10, 2022Updated 3 years ago
- A list of tools that make developer experience with cloud providers easier☆57Jan 30, 2025Updated last year
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated 2 months ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆55Mar 4, 2026Updated last week
- A set of small utilities that you probably miss☆20Mar 8, 2025Updated last year
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- a simple, multi-tenant rss feed reader☆23Sep 30, 2025Updated 5 months ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- AWS CloudWatch log viewer☆25Sep 24, 2025Updated 5 months ago
- A silly project for free (maybe) egress from EC2 instances using Tailscale and Session Manager☆31Jun 6, 2023Updated 2 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- ☆117Feb 11, 2026Updated last month
- A multi-vault secret injection tool for safely injecting secrets into app environment☆133Mar 2, 2026Updated last week
- DynamoDB library for single-table design in Rust☆31Jun 30, 2023Updated 2 years ago
- High-performance workflow platform for real-time data orchestration. Scalable by design, fault-tolerant by nature, and built for complex …☆31Mar 4, 2026Updated last week
- Vandalize old emails. Like an NFT that's easy to prove ownership of.☆34Jul 20, 2023Updated 2 years ago
- Run a temporary DNS server that resolves a given hostname to the current IP☆34Nov 25, 2020Updated 5 years ago
- Scan your account for the use of untrusted AMIs☆32Updated this week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Practice typing and improve your typing speed (WPM).☆10Aug 20, 2020Updated 5 years ago
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 3 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- ☆46Nov 7, 2024Updated last year
- ☆40Aug 2, 2024Updated last year
- Pruun is a CL utility for easily creating AWS lambda deployment packages within Python virtualenvs.☆39Oct 11, 2020Updated 5 years ago
- Precision Knowledge Editing (PKE): A novel method to reduce toxicity in LLMs while preserving performance, with robust evaluations and ha…☆11Nov 26, 2024Updated last year
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 4 months ago
- CloudGraph managed policy packs☆10May 17, 2023Updated 2 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- The SQL link in your *NIX chain☆22Feb 28, 2013Updated 13 years ago
- ☆10May 12, 2022Updated 3 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- ☆11Feb 7, 2020Updated 6 years ago
- Dockerfile for johnsmith0031/alpaca_lora_4bit☆12Apr 10, 2023Updated 2 years ago
- A Common Controller Core Library for orchestrating an F5 BIG-IP☆12Dec 22, 2025Updated 2 months ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Sep 20, 2022Updated 3 years ago