vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.
☆26Feb 23, 2021Updated 5 years ago
Alternatives and similar repositories for vsphere-hardening-guide
Users that are interested in vsphere-hardening-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Appliance Backups in PowerShell☆29Jan 5, 2023Updated 3 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Sep 6, 2023Updated 2 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 7 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Collection of reusable references☆14Updated this week
- Python quick reference☆21Nov 14, 2013Updated 12 years ago
- Skeleton of a home lab for learning about DevOps from an infrastructure perspective☆10Mar 2, 2017Updated 9 years ago
- This Repository is for random Knicks and knacks - in relation to PowerShell scripts I have created for one task or another.☆16Jan 13, 2025Updated last year
- Builds a hosts file and an Unbound config for blocking advertising and malware domains.☆10Jan 3, 2016Updated 10 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- My Vagrantfiles for sandbox tests☆12Jun 18, 2020Updated 5 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Runs programs as TrustedInstaller☆49Jul 1, 2019Updated 6 years ago
- ☆34Feb 26, 2015Updated 11 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Puppet module that hardens Windows Server to DoD STIG compliance☆14Sep 11, 2019Updated 6 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- A repository for Shadow Daemon rules☆12Sep 2, 2020Updated 5 years ago
- provides both a GUI and interface for doing netsh http urlacl stuff - this is a fork from codeplex of the same name. http://httpsysmanage…☆14Mar 8, 2018Updated 8 years ago
- A tool to password spray Jenkins instances☆60May 28, 2019Updated 6 years ago
- ☆57Aug 7, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- DevOps with Windows Server 2016, by Packt☆15Jan 18, 2023Updated 3 years ago
- PSCloudConnect connects to Office 365 services and/or Azure Tenants with saved credentials☆11Jun 27, 2018Updated 7 years ago
- A simple RSS aggregator that displays messages as balloon tooltips in the windows task bar.☆15Jun 14, 2023Updated 2 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- ☆15Apr 6, 2020Updated 6 years ago
- Ansible configurations for distributed MultiScanner installations☆14Apr 11, 2019Updated 7 years ago
- Open source Arduino sketch for the smart WiFi dev board ANAVI Fume Extractor☆16Aug 9, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Nagios plugin to provide network interface statistics with some automatic configuration.☆17Nov 16, 2015Updated 10 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆40Aug 21, 2018Updated 7 years ago
- ☆319Feb 9, 2020Updated 6 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated 2 years ago
- Virtual machine templates for ESXi, the VMware bare-metal hypervisor written legacy JSON☆23Oct 16, 2022Updated 3 years ago
- 该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。☆31Dec 7, 2020Updated 5 years ago
- Documentation of TheHive☆399Sep 20, 2023Updated 2 years ago