Showing 26 open source projects for "common"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    FLARE VM

    FLARE VM

    A collection of software installations scripts for Windows systems

    ...It bundles a curated set of tools—disassemblers, debuggers, decompilers, virtualization, forensics utilities, packet capture tools, exploit frameworks, and hex editors—preconfigured to work together. The environment configures paths, dependencies, environment variables, and common tool integrations so analysts can focus on tasks rather than setup. Updates and modular installation let users include only the tools that match their workflow, keeping the VM lean and current. Because security toolchains often clash (DLL versions, signing, privileges), FLARE VM’s packaging handles compatibility issues ahead of time. ...
    Downloads: 89 This Week
    Last Update:
    See Project
  • 2
    TinyTeX releases

    TinyTeX releases

    Windows/macOS/Linux binaries and installation methods of TinyTeX

    A lightweight, cross-platform, portable, and easy-to-maintain LaTeX distribution based on TeX Live. TinyTeX is a custom LaTeX distribution based on TeX Live that is small in size but functions well in most cases, especially for R users. If you run into the problem of missing LaTeX packages, it should be super clear to you what you need to do (in fact, R users won’t need to do anything). You only install LaTeX packages you actually need. Currently, TinyTeX works best for R users. Other users...
    Downloads: 36 This Week
    Last Update:
    See Project
  • 3
    AzureAD Attack Defense

    AzureAD Attack Defense

    This publication is a collection of various common attack scenarios

    AzureAD-Attack-Defense is a community-maintained playbook that collects common attack scenarios against Microsoft Entra ID (formerly Azure Active Directory) together with detection and mitigation guidance. The repository is organized into focused chapters — for example: Password Spray, Consent Grant, Service Principals in Azure DevOps, Entra Connect Sync Service Account, Replay of Primary Refresh Token (PRT), Entra ID Security Config Analyzer, and Adversary-in-the-Middle — each written to explain the attack, show detection approaches, and recommend mitigation steps. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Sophia Script for Windows

    Sophia Script for Windows

    The most powerful PowerShell module for fine-tuning Windows

    ...It abstracts over native APIs and offers constructs that make system automation, file manipulation, registry access, and user scripting easier than raw PowerShell or batch scripts. The repository presumably contains runtime, script engine, and library helpers to simplify common Windows tasks (e.g., service control, UI automation, scheduled tasks). Because Windows scripting often involves glue between COM, WMI, and system APIs, Sophia’s design likely aims to unify those surfaces behind consistent semantics. For developers or sysadmins, it offers an alternative tool for building lightweight Windows automation without resorting to full compiled utilities. ...
    Downloads: 15 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    Scoop Main

    Scoop Main

    The default bucket for Scoop

    ...It holds a curated set of portable or minimally invasive applications that adhere to Scoop’s standards (i.e. apps that don’t heavily depend on installer frameworks or registry tweaks). When a user installs Scoop, the Main bucket is automatically configured, so users can immediately install common command-line tools and utilities without adding extra buckets. The manifests in Main are JSON files that describe how to download, install, uninstall, and manage versions of apps (including dependencies, checksums, etc.). Because it’s the default bucket, maintainers apply stricter validation and review policies to keep Main reliable and safe compared to more experimental or niche buckets. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    Windows Super God Mode

    Windows Super God Mode

    Creates shortcuts to virtually every special location or action built

    ...It automates creation of “God Mode” folders and other control-panel shortcuts, removes the need to manually hunt through layers of Settings or the Registry, and often bundles helper scripts for common maintenance tasks. The intent is to put power-user features—tweaks for privacy, appearance, power management, and system behavior—within quick reach so administrators and enthusiasts can configure machines consistently. Because many of the actions touch system settings, the collection emphasizes clear instructions and reversible steps so users can roll back changes if needed. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 7
    Rust Course

    Rust Course

    It has been the world's most popular language for 8 consecutive years

    ...The project emphasizes practical learning through exercises, helping users approach Rust study as if it were a university course. It also provides a "Cookbook" section of practical code snippets for common tasks such as file operations, regex handling, and database interactions, allowing learners to quickly reference solutions without searching externally.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    MicroBurst

    MicroBurst

    A collection of scripts for assessing Microsoft Azure security

    MicroBurst is a PowerShell toolkit from NetSPI focused on assessing Microsoft Azure security by automating discovery, enumeration, and targeted auditing of cloud services and configurations. It bundles many functions to enumerate Azure resources (subscriptions, VMs, storage accounts, container registries, App Services and more), probe common misconfigurations, and harvest sensitive artifacts when available (for example storage blobs, keys, automation account credentials, and other subscription-level secrets). The project exposes both interactive helpers and scripted commands (e.g., Invoke-EnumerateAzureBlobs, Invoke-EnumerateAzureSubDomains, REST-based VM command execution and storage key retrieval routines) so operators can pivot from discovery to validated proof-of-concept actions during authorized penetration tests.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Domain Password Spray

    Domain Password Spray

    A tool written in PowerShell to perform password assessments

    DomainPasswordSpray is a focused security tool designed to perform enterprise-scale password spraying assessments against Active Directory environments. It automates the process of attempting common or customized passwords against many accounts while respecting timing and throttling controls to reduce obvious lockout noise. The project includes features for credential list management, target selection (users, service accounts, or collections), and configurable rate limits so testers can tune the balance between coverage and stealth. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 10
    Fast-Kubernetes

    Fast-Kubernetes

    This repo covers Kubernetes with LABs: Kubectl, Pod, Deployment

    Fast-Kubernetes is a practical, hands-on repository that explains Kubernetes concepts and walks users through dozens of bite-size labs and examples. The content is organized as Markdown how-tos and cheat-sheets covering core objects and workflows — Pods, Deployments, Services, ConfigMaps, Secrets, PV/PVC, StatefulSets, DaemonSets, Jobs/CronJobs, Ingress, affinity/taints, and more — plus command-line kubectl quick references. It also includes end-to-end cluster setup guides (kubeadm with...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PowerHub

    PowerHub

    A post exploitation tool based on a web application

    PowerHub is a PowerShell-based automation framework designed to centralize and orchestrate common administrative tasks across Windows environments. It exposes a modular command set for inventorying systems, managing services, deploying packages, and executing remote commands with consistent logging and error handling. The project places emphasis on discoverability and reuse: scripts are organized into reusable modules and functions with clear parameter contracts so teams can compose higher-level workflows without duplicating glue code. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    IntuneManagement

    IntuneManagement

    Copy, export, import, delete, document and compare policies

    ...It provides helpers to manage device enrollment, configuration profiles, compliance rules, application assignments, and reporting, often leveraging PowerShell and the Microsoft Graph API to perform bulk operations. The toolkit is aimed at IT pros who must apply consistent policies across many endpoints, offering idempotent commands and templates to codify common policies and onboarding flows. Many such projects include sample automation for dynamic device groups, license checks, or automatic remediation workflows triggered by compliance violations. Because enterprise device fleets require auditability and repeatability, the repo focuses on reproducible scripts, logging, and parameterization so they can be integrated into larger automation frameworks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    PrivescCheck

    PrivescCheck

    Privilege Escalation Enumeration Script for Windows

    PrivescCheck is a local privilege escalation reconnaissance tool for Unix-like systems that automates common checks auditors and system owners run when looking for misconfigurations. It enumerates kernel versions, installed packages, SUID/SGID binaries, world-writable files and directories, services, cron jobs, and user/group permissions to highlight likely escalation paths. The output is organized and human-readable so operators can triage findings quickly—flagging high-risk items separately from informational noise. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    AI File Sorter

    AI File Sorter

    Local AI file organization with categorization and rename suggestions

    ...The app can analyze images locally and propose descriptive rename suggestions (for example, IMG_2048.jpg → clouds_over_lake.jpg). It can also analyze document text to improve categorization and renaming. Supported formats include PDF, DOCX, XLSX, PPTX, ODT, ODS, ODP, and common text files. For supported audio and video files, AI File Sorter can read embedded metadata (such as ID3, Vorbis, and MP4 tags) to suggest normalized names like year_artist_album_title.ext. AI analysis runs read-only, and all suggestions must be reviewed before being applied. AI File Sorter can run fully offline using local models like Mistral or LLaMA, so files and metadata stay on your device unless you configure a remote endpoint.
    Leader badge
    Downloads: 998 This Week
    Last Update:
    See Project
  • 15
    Ultimate AppLocker Bypass List

    Ultimate AppLocker Bypass List

    The most common techniques to bypass AppLocker

    ...The project functions as a living catalog: entries list binaries, script hosts, and patterns that researchers have tested or reported in the wild, along with notes about context, platform constraints, and mitigation ideas. It is aimed primarily at defenders, incident responders, and security researchers who need a consolidated reference to understand common bypass vectors and to validate detection logic. The repository emphasizes defensive use—helping blue teams craft allow-list policies, create detection rules, and test policy hardening in isolated lab environments—rather than offensive exploitation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Sysmon-Modular

    Sysmon-Modular

    A repository of sysmon configuration modules

    ...It includes pre-generated configuration variants (balanced, default with FileDelete, verbose, super-verbose, and a Microsoft Defender for Endpoint augmentation) to cover common use cases while warning about the performance tradeoffs of very verbose settings. The repo ships helper tooling (PowerShell and Python scripts) to merge selected modules into a final sysmonconfig.xml, automating CI builds and allowing repeatable config generation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Penetration Testing Tools

    Penetration Testing Tools

    A collection of more than 170+ tools, scripts, cheatsheets

    ...The repository groups resources by discipline — reconnaissance, web application testing, network exploitation, privilege escalation, post-exploitation and reporting — so users can quickly find relevant utilities and walkthroughs. Many entries include short usage notes, common command examples, and links to upstream projects or writeups, turning the repo into both a toolbox and a practical learning library. The collection emphasizes tooling that is easy to run in lab environments and often points to small scripts and one-file utilities that accelerate common tasks like service discovery, credential harvesting, or privilege checks.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 18
    DeepBlueCLI

    DeepBlueCLI

    PowerShell Module for Threat Hunting via Windows Event Logs

    DeepBlueCLI is a PowerShell-centric threat-hunting toolkit built to extract, normalize, and flag suspicious activity from Windows event logs and Sysmon telemetry. It parses common sources—including Windows Security, System, Application, PowerShell logs, and Sysmon event ID 1—then applies a rich set of detection heuristics for things like suspicious account changes, password guessing and spraying, service tampering, PowerShell obfuscation and download-string usage, long or unusual command lines, and credential dumping attempts. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    vulnerable-AD

    vulnerable-AD

    Create a vulnerable active directory

    Vulnerable-AD is a PowerShell toolkit that automates the creation of a deliberately insecure Active Directory domain for hands-on labs and testing. It builds a domain controller (or augments an existing AD installation) with a variety of common misconfigurations and intentional weaknesses so practitioners can exercise attack techniques such as Kerberoast, AS-REP roast, DCSync, Pass-the-Hash, Silver/Golden Ticket attacks, and more. The project can create user objects with default or weak passwords, inject passwords into object descriptions, disable SMB signing, and manipulate ACLs to reproduce real-world privilege escalation and persistence scenarios. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Windows Dev Box Setup Scripts

    Windows Dev Box Setup Scripts

    Scripts to simplify setting up a Windows developer box

    Windows Dev Box Setup Scripts is a Microsoft-maintained collection of PowerShell “recipes” and helper scripts that automate and streamline provisioning a Windows developer workstation for many common stacks (desktop .NET/C++, web/Node, machine learning, DevOps, containers, and more). The project uses Chocolatey and Boxstarter under the hood and exposes one-click Boxstarter links and standalone scripts so you can boot a machine, install SDKs, runtimes, tooling, and manage reboots unattended. Scripts are organized as high-level recipes (for example: Full Desktop App, Web, Web + NodeJS, Machine Learning, DevOps/Azure) which call smaller helper scripts stored in a scripts/ folder so recipes stay readable and easy to customize. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    posh-git

    posh-git

    A PowerShell environment for Git

    posh-git is a PowerShell module which provides Git/PowerShell integration. The prompt within Git repositories can show the current branch and the state of files (additions, modifications, deletions) within. Provides tab completion for common commands when using git. Prompt formatting, among other things, can be customized. Displaying file status in the git prompt for a very large repo can be prohibitively slow. Rather than turn off file status entirely, you can disable it on a repo-by-repo basis by adding individual repository paths. PowerShell generates its prompt by executing a prompt function, if one exists. posh-git defines such a function in profile.example.ps1 that outputs the current working directory followed by an abbreviated git status.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 22
    PowerRemoteDesktop

    PowerRemoteDesktop

    Remote Desktop entirely coded in PowerShell

    ...The project tends to be useful in managed Windows estates where remote session visibility and lightweight automation reduce manual clicking in administrative consoles. It is positioned as an ops/productivity aid rather than a replacement for full remote-control software, emphasizing repeatable, auditable scripts for common remote desktop tasks.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Active Directory Exploitation

    Active Directory Exploitation

    A cheat sheet that contains common enumeration and attack methods

    Active-Directory-Exploitation-Cheat-Sheet is a comprehensive, community-curated cheat sheet that collects practical enumeration commands, attack techniques, and quick references for attacking and auditing Windows Active Directory environments. The repository is organized as a stepwise kill-chain: recon, domain enumeration, local privilege escalation, user hunting, BloodHound guidance, lateral movement, persistence, domain-admin takeover, cross-trust attacks, data exfiltration, and a toolbox...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    WinPwn

    WinPwn

    Automation for internal Windows Penetrationtest / AD-Security

    WinPwn is a PowerShell-based toolkit for automating internal Windows penetration testing and Active Directory reconnaissance. It streamlines many manual steps by integrating reconnaissance modules like Seatbelt, Inveigh, Rubeus, and PrivescCheck. With proxy auto‑detection, endpoint enumeration, and exploitation routines, it's widely used in red team and blue team tool chains.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    Ansible Examples

    Ansible Examples

    A few starter examples of ansible playbooks, to show features

    ...Each directory demonstrates a specific use case—ranging from setting up web servers, load balancers, and databases to orchestrating multi-tier applications in cloud environments. The examples highlight common Ansible practices such as organizing inventories, writing reusable playbooks, using roles, and handling variables and templates. They’re designed to be adapted directly into your own infrastructure or to serve as reference blueprints when learning how to structure automation projects. Whether you’re managing a handful of servers or deploying at scale, this repo provides starting points that illustrate how Ansible can streamline repetitive operational tasks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB