- Estonia
Highlights
Stars
The Open Source Incident Management Framework
Self-host n8n on Google Cloud without the subscription fees or server headaches - because your automation workflows shouldn't cost more than your coffee budget
The easiest and fastest way to create and manage Kubernetes clusters in Hetzner Cloud using the lightweight distribution k3s by Rancher.
A simple screen parsing tool towards pure vision based GUI agent
Bambdas collection for Burp Suite Professional and Community.
A curated list of amazingly awesome Burp Extensions
A curated list of awesome libraries, tools, and integrations for Hetzner Cloud
Magic to turn Cursor/Windsurf as 90% of Devin
Collection of example YARA-L rules for use within Google Security Operations
Coroot is an open-source observability and APM tool with AI-powered Root Cause Analysis. It combines metrics, logs, traces, continuous profiling, and SLO-based alerting with predefined dashboards a…
Open Cyber Threat Intelligence Platform
Self-hosted Docker native tunneling to localhost. Expose local docker containers to the public Internet via a simple docker compose interface.
A web-based UI for deploying and managing applications in Kubernetes clusters
Deeptechia / geppetto
Forked from CoinFabrik/geppettoGeppetto: Advanced bot using multiple AI models for interactive conversations and creative image generation. Enhances Slack with automated responses and intelligent dialogues, supporting flexible m…
All the resources you need to get to Senior Engineer and beyond
The SpecterOps project management and reporting engine
Easily setup logical replication and switchover to new database with minimal downtime
Ultimate Script to complete PostgreSQL-to-PostgreSQL Migration right after AWS DMS task done
Pretty basic theme for Hugo that covers all of the essentials. All you have to do is start typing!
A powerful and user-friendly browser extension that streamlines investigations for security professionals.
A curated list of tools for incident response
Keep your sensitive information out of chat logs, emails, and more with encrypted secrets.