A tool that allows you to run commands on multiple hosts
☆28Dec 26, 2019Updated 6 years ago
Alternatives and similar repositories for wsh
Users that are interested in wsh are comparing it to the libraries listed below
Sorting:
- my pizza recipe☆15Aug 14, 2023Updated 2 years ago
- a fast productivity cli for Trello☆28Sep 27, 2022Updated 3 years ago
- Kuberetes etcd network checkpointer☆11Jul 20, 2017Updated 8 years ago
- A signature updater and optional private mirroring server for ClamAV☆10Aug 2, 2017Updated 8 years ago
- A certificate authority written in Python with pyOpenSSL and cryptography.io.☆10Feb 24, 2017Updated 9 years ago
- Imports an object based on a string import_string('package.module:function_name')() - Based on werkzeug.utils☆11Nov 7, 2019Updated 6 years ago
- ☆18Jun 14, 2023Updated 2 years ago
- A library for Penner's easing equations.☆16Oct 9, 2015Updated 10 years ago
- NginX configuration files parser and generator - unstable new version☆13Nov 19, 2014Updated 11 years ago
- Events support in ngraph.*☆20Sep 27, 2025Updated 5 months ago
- Detect the character encoding using Google’s compact_enc_det library☆18Dec 21, 2022Updated 3 years ago
- [Do not use] Coroutines with async/await/yield for Rust☆13Apr 30, 2016Updated 9 years ago
- 完整版:the purported Equation Group(NSA下属) hack by the Shadow Brokers(影子经纪人)--234MB☆18Jan 25, 2018Updated 8 years ago
- A Javascript REPL (code editor and code results) component using svelte☆14Dec 3, 2022Updated 3 years ago
- Packaging Metadata Comparions☆18Apr 3, 2020Updated 5 years ago
- Minimal VIM theme☆15Mar 25, 2017Updated 8 years ago
- Web Authentication with X509 smart cards☆16Nov 18, 2024Updated last year
- Javascript plugin for FreeIPA adding a picture widget with preview and file uploader (usefull to manage user avatars in jpegphoto ldap at…☆13Aug 26, 2024Updated last year
- APDU interface of EstEID cards in JavaScript☆16Feb 11, 2020Updated 6 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- Dis interpreter by Rob Pike☆13Sep 3, 2020Updated 5 years ago
- Python client for RiskIQ API services☆17Sep 7, 2018Updated 7 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- expose crud functions for a seraph model over http☆21Nov 13, 2017Updated 8 years ago
- ☆10Feb 10, 2023Updated 3 years ago
- ☆14Aug 4, 2016Updated 9 years ago
- 🤖 Computer setup☆11Nov 11, 2025Updated 4 months ago
- 🔒 Final classes for Python3!☆17Jul 21, 2021Updated 4 years ago
- A Python 2.x library for asynchronous tasks☆13May 8, 2019Updated 6 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Libraries and tools for extracting Coq code to F#☆14Aug 16, 2013Updated 12 years ago
- An interactive command line interface for displaying the state of multiple git repositories in a single screen☆48Mar 19, 2015Updated 11 years ago
- eda-3 from many years ago☆14Sep 5, 2014Updated 11 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- Marlowe makes it easier to trace a request through all of your application logs☆10Feb 27, 2024Updated 2 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- ☆15Oct 17, 2018Updated 7 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago