A comprehensive comparison of AWS services and their Azure equivalents, including descriptions and key functionalities for cloud migration, hybrid solutions, and cross-cloud architecture.
☆41Nov 17, 2024Updated last year
Alternatives and similar repositories for aws-to-azure-service-equivalents
Users that are interested in aws-to-azure-service-equivalents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Comprehensive Collection of Interview Questions for Cloud Engineers.☆124Nov 2, 2024Updated last year
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- A small script to import and ban IPs from a list (like from blocklist.de)☆14Oct 23, 2016Updated 9 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 7 months ago
- This role installs, configures and activates dnf-automatic via Ansible on hosts which use the dnf package manager.☆23Jan 10, 2026Updated 3 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A self-hosted Armory implementation.☆24Jan 1, 2026Updated 3 months ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Mar 21, 2026Updated 3 weeks ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Maintained list of Stretchoid scanner IPs☆11Updated this week
- 🎭 Reveal the identity behind a share link☆83Updated this week
- NeXSS is a modern, self-hosted Blind XSS (Cross-Site Scripting) hunter and callback listener built with Next.js. It helps security resear…☆30Jan 14, 2026Updated 2 months ago
- ☆32Jun 1, 2024Updated last year
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- Reset IDE data, Create backup and restore, manage multi-account easily, Work for VS-Code/fork based app.☆31Feb 11, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- A proof of concept project to detect an stop Evil Twin Attacks.☆17Oct 3, 2019Updated 6 years ago
- AI hacking snippets for prompt injection, jailbreaking LLMs, and bypassing AI filters. Ideal for ethical hackers and security researchers…☆51Updated this week
- A simple meme making php script developed implementing the PHP GD Library.☆17Apr 16, 2025Updated 11 months ago
- ☆25Nov 16, 2023Updated 2 years ago
- My personal pretesting recon/low hanging fruit script. Uses Gxss, Dalfox, and a few other scripts to scan all of a domain(and/or subdomai…☆24Dec 12, 2025Updated 3 months ago
- ☆26Jul 12, 2023Updated 2 years ago
- This repository contains a cheatsheet with key information to help you prepare for the AWS Certified Solutions Architect Associate (SAA-C…☆278Jul 12, 2025Updated 8 months ago
- Single animated HTML file that teaches the workings of the TCP Handshake.☆28Mar 10, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆29Mar 7, 2023Updated 3 years ago
- Sample on how to use request/response with MassTransit and ASP.NET Core☆40Aug 21, 2020Updated 5 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Obtain an email full profile including reputation, consistency, deliverability, social networks account linked, plus more data points.☆40Mar 22, 2023Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Sep 6, 2024Updated last year
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Jan 14, 2025Updated last year
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆50Jan 1, 2026Updated 3 months ago
- All in one Pentest methodologies - Tools and commands | Where compiled all common materials for pentester☆43Aug 23, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆69Jan 11, 2026Updated 3 months ago
- AI-powered vulnerability scanner extension for Burp Suite with multi-provider support (Ollama, OpenAI, Claude, Gemini)☆269Mar 19, 2026Updated 3 weeks ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- Exfiltrate files via DNS☆95Aug 29, 2013Updated 12 years ago
- Acunetix Premium v24.10.241106172 | Linux☆102Dec 26, 2024Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆79Jan 22, 2026Updated 2 months ago
- ☆124May 12, 2021Updated 4 years ago