Stars
Clone all of your Github repositories, just single command from your terminal.
Full-lifecycle cloud infrastructure cluster management, using Ansible
Authentication, authorization, traceability and auditability for SSH accesses.
A curated list of resources for learning about application security
Rotate your IAM Keys to be in compliance with security best practices
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Scans Burst mining logs and reports corrupted plot files.
Converts POC1 plots to POC2 plots in Windows
Project Wycheproof tests crypto libraries against known attacks.
Community guide to securing and improving privacy on macOS.
Security Role for OpenStack-Ansible
📙 Amazon Web Services — a practical guide
blueboxgroup / ursula
Forked from scoop206/ursulaAnsible playbooks for operating OpenStack - Powering Blue Box Cloud.
The Pokemon Go Bot, baking with community.
No wait for skip button (Chrome extension, Bookmarklet)
Kafkamorph / shutit
Forked from ianmiell/shutitComplex Docker Deployments Made Simple