Showing 8 open source projects for "notes"

View related business solutions
  • White Labeled Fintech Software Solutions | Centrex Icon
    White Labeled Fintech Software Solutions | Centrex

    Centrex is a full suite of white labeled fintech solutions built and designed for brokers, lenders, banks, investors, fintechs

    The Centrex products include: CRM, loan origination, loan and advance servicing software, syndication management, white labeled mobile app, money manager, underwriting, Esign, and website smart app builder. The Centrex services include: fintech software consulting, admin retainer services, and managed data cloud.
    Learn More
  • Free Website Monitoring Service | UptimeRobot Icon
    Free Website Monitoring Service | UptimeRobot

    The free online uptime monitoring service with an App is available for iOS and Android.

    With the Free Plan, you can monitor up to 50 URLs, check for a website's content (using the keyword monitor), ping your server or monitor your ports in 5-minute intervals. You can create a status page to showcase your uptime. SMS or Call alerts can be bought anytime.
    Learn More
  • 1
    Re-image the Windows

    Re-image the Windows

    These scripts to configure a ready-to-use Windows environment

    Reimage-Windows is a repo for automating and documenting the process of reinstalling or “reimaging” Windows, turning what is normally a manual, error-prone chore into a repeatable pipeline. It bundles scripts, configuration, and notes so that after a clean Windows install you can run one or two commands to get your environment back. The project is aimed at people who rebuild machines often, maintain several PCs, or just want a disaster-recovery style setup for Windows. It encourages treating OS setup like code: versioned, reviewable, and improvable over time. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    Thanos.sh

    Thanos.sh

    if you are Thanos(root), this command could delete half your files

    ...It ships as a shell script plus a PowerShell variant (Invoke-Thanos.ps1) that can target files, environment variables, registry entries, functions, aliases and certificates, and the repository warns repeatedly not to run it casually. The project includes short installation notes (for example, macOS requires gshuf from coreutils) and a README that frames the script as a “real gun” that should be used with extreme caution. By design the repo is blunt and provocative: it contains a Story.md for user anecdotes, and the README even notes the script only displays how many files would be deleted in one run. The codebase is mainly PowerShell and shell, licensed MIT, and has attracted attention and stars as a curiosity / research / prank tool rather than a production utility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Fast-Kubernetes

    Fast-Kubernetes

    This repo covers Kubernetes with LABs: Kubectl, Pod, Deployment

    ...The content is organized as Markdown how-tos and cheat-sheets covering core objects and workflows — Pods, Deployments, Services, ConfigMaps, Secrets, PV/PVC, StatefulSets, DaemonSets, Jobs/CronJobs, Ingress, affinity/taints, and more — plus command-line kubectl quick references. It also includes end-to-end cluster setup guides (kubeadm with containerd or Docker, Minikube examples), Helm and CI/CD notes (Helm + Jenkins lab), and monitoring guidance with Prometheus & Grafana so learners can practice real operational tasks. Labs are written as short, reproducible exercises (imperative and declarative examples) designed for people who already know containers and want concrete, runnable Kubernetes practice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Sysmon-Modular

    Sysmon-Modular

    A repository of sysmon configuration modules

    sysmon-modular is a community-driven repository that provides a modular, production-ready set of Sysmon configuration modules designed to be easily composed and tuned for different environments. The project organizes detection logic into per-event modules (for example, process creation, file create, network connection, registry events, image load, and many more) so operators can pick and choose which rules to enable without editing a monolithic XML by hand. It includes pre-generated...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Powerfully Simple Remote Monitoring and Management Software Icon
    Powerfully Simple Remote Monitoring and Management Software

    NinjaRMM provides intuitive endpoint management software to managed service providers (MSPs) and IT professionals

    If you're looking to support your clients and manage IT more efficiently, turn to NinjaRMM. The world's first security centric remote monitoring and management (RMM) platform, NinjaRMM enables IT professionals to monitor and manage the entire IT stack with full automation all within a single pane of glass. The platform features search and connect through TeamViewer, antivirus integration, real-time alerts, managed patching, automation, software inventory, and reporting.
    Free Trial
  • 5
    Ultimate AppLocker Bypass List

    Ultimate AppLocker Bypass List

    The most common techniques to bypass AppLocker

    UltimateAppLockerByPassList is a community-curated repository that collects known techniques, patterns, and candidate binaries that have been observed or proposed to bypass Microsoft AppLocker and similar executable control policies. The project functions as a living catalog: entries list binaries, script hosts, and patterns that researchers have tested or reported in the wild, along with notes about context, platform constraints, and mitigation ideas. It is aimed primarily at defenders, incident responders, and security researchers who need a consolidated reference to understand common bypass vectors and to validate detection logic. The repository emphasizes defensive use—helping blue teams craft allow-list policies, create detection rules, and test policy hardening in isolated lab environments—rather than offensive exploitation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Penetration Testing Tools

    Penetration Testing Tools

    A collection of more than 170+ tools, scripts, cheatsheets

    ...The repository groups resources by discipline — reconnaissance, web application testing, network exploitation, privilege escalation, post-exploitation and reporting — so users can quickly find relevant utilities and walkthroughs. Many entries include short usage notes, common command examples, and links to upstream projects or writeups, turning the repo into both a toolbox and a practical learning library. The collection emphasizes tooling that is easy to run in lab environments and often points to small scripts and one-file utilities that accelerate common tasks like service discovery, credential harvesting, or privilege checks.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 7
    Windows Dev Box Setup Scripts

    Windows Dev Box Setup Scripts

    Scripts to simplify setting up a Windows developer box

    ...Scripts are organized as high-level recipes (for example: Full Desktop App, Web, Web + NodeJS, Machine Learning, DevOps/Azure) which call smaller helper scripts stored in a scripts/ folder so recipes stay readable and easy to customize. The README documents how to run recipes, notes for WSL users, guidance for organizational or classroom use (including ways to adapt scripts to air-gapped environments), and known issues and workarounds encountered with the Boxstarter web launcher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Active Directory Exploitation

    Active Directory Exploitation

    A cheat sheet that contains common enumeration and attack methods

    ...It aggregates short, copy-ready PowerShell, C, .NET and Python snippets as well as command examples so operators can quickly run checks or reproduce techniques in lab environments. The content also includes .NET payload patterns, reverse PowerShell helpers, notes on privileged accounts and groups, and practical tips for hunting or protecting high-value targets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB