theNetworkChuck / CCNALinks
☆11Updated 5 years ago
Alternatives and similar repositories for CCNA
Users that are interested in CCNA are comparing it to the libraries listed below
Sorting:
- ☆18Updated 5 years ago
- ☆47Updated 6 years ago
- CCIE routing and switching notes and references, with a general directory and specific topic directories.☆23Updated 4 years ago
- Collection of scripts, files, and tips to create and maintain networks, hack, and more!☆75Updated 4 years ago
- ☆18Updated 5 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Updated last week
- A PoC backdoor that uses Gmail as a C&C server☆13Updated 5 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆21Updated 9 months ago
- Useful PowerShell one-liner (and some two-liner) commands☆24Updated 3 years ago
- CyberArk Ansible Security Automation Collection☆64Updated 2 months ago
- My various configuration files for zsh, vim, tmux, etc.☆25Updated 3 years ago
- AutoSpamEmailScan.ps1 is used to monitor a specific mailbox that enterprise users can forward suspicious spam emails to a specific mailbo…☆15Updated 2 years ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆13Updated last year
- Middleware and macros/ui extensions to control smart buildings with Webex devices☆19Updated 5 months ago
- A FREE course that takes you step-by-step through building a custom Automation Ansible Framework from scratch.☆22Updated last month
- A skeleton project for quickly getting a new cisagov Docker container started.☆19Updated this week
- Hardened Windows Server image☆19Updated 6 years ago
- Code repository for exercises in the eBook WebAPI Development with Python☆33Updated 2 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆24Updated 9 years ago
- CLI tool to generate terraform files from existing ZPA and ZIA☆23Updated 2 weeks ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆24Updated 4 years ago
- A collection of my homelab diagrams throughout time.☆62Updated 5 years ago
- Kismet website generation & documentation data☆12Updated 2 weeks ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated 3 weeks ago
- A generic skeleton project for quickly getting a new cisagov project started.☆18Updated 3 weeks ago
- Collection of reusable references☆13Updated last week
- ExtraHop public code examples☆36Updated last year
- Tools for taking over Crestron Windows CE devices☆34Updated 3 years ago
- Ansible role to deploy Cyberark Password Vault Web Access☆21Updated last month
- Generate HTTPS reports based on scan data☆15Updated this week