Showing 8 open source projects for "notes"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • #1 Solar Design & CRM Software for fast-growing solar businesses. Icon
    #1 Solar Design & CRM Software for fast-growing solar businesses.

    Solar businesses looking for a design and CRM solution to create compelling solar proposals

    Create accurate proposals from anywhere in under 2 minutes using hi-res imagery, energy analysis and 3D shading tools in Pylon's intuitive design studio. Pylon is the only solar design software to give you high-resolution imagery in-app with no monthly fees. Identify dates of concern and track shading impact throughout the year using Pylon's award-winning 3D Solar Shading toolkit. Help your team better understand customer consumption patterns and maximize self-consumption using Pylon's load profile and interval data analysis. Analyze load profiles & interval data. Close more solar proposals with interactive Web & PDF proposals, native eSignatures and a payment processing gateway. Fully integrated solar CRM designed to integrate with your solar design software and convert proposals. Get 2-way SMS and email, communications with your team, lead management, and ready-made deal pipelines with Pylon Solar CRM.
    Learn More
  • 1
    Re-image the Windows

    Re-image the Windows

    These scripts to configure a ready-to-use Windows environment

    Reimage-Windows is a repo for automating and documenting the process of reinstalling or “reimaging” Windows, turning what is normally a manual, error-prone chore into a repeatable pipeline. It bundles scripts, configuration, and notes so that after a clean Windows install you can run one or two commands to get your environment back. The project is aimed at people who rebuild machines often, maintain several PCs, or just want a disaster-recovery style setup for Windows. It encourages treating OS setup like code: versioned, reviewable, and improvable over time. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    Fast-Kubernetes

    Fast-Kubernetes

    This repo covers Kubernetes with LABs: Kubectl, Pod, Deployment

    ...The content is organized as Markdown how-tos and cheat-sheets covering core objects and workflows — Pods, Deployments, Services, ConfigMaps, Secrets, PV/PVC, StatefulSets, DaemonSets, Jobs/CronJobs, Ingress, affinity/taints, and more — plus command-line kubectl quick references. It also includes end-to-end cluster setup guides (kubeadm with containerd or Docker, Minikube examples), Helm and CI/CD notes (Helm + Jenkins lab), and monitoring guidance with Prometheus & Grafana so learners can practice real operational tasks. Labs are written as short, reproducible exercises (imperative and declarative examples) designed for people who already know containers and want concrete, runnable Kubernetes practice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Sysmon-Modular

    Sysmon-Modular

    A repository of sysmon configuration modules

    sysmon-modular is a community-driven repository that provides a modular, production-ready set of Sysmon configuration modules designed to be easily composed and tuned for different environments. The project organizes detection logic into per-event modules (for example, process creation, file create, network connection, registry events, image load, and many more) so operators can pick and choose which rules to enable without editing a monolithic XML by hand. It includes pre-generated...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Ultimate AppLocker Bypass List

    Ultimate AppLocker Bypass List

    The most common techniques to bypass AppLocker

    UltimateAppLockerByPassList is a community-curated repository that collects known techniques, patterns, and candidate binaries that have been observed or proposed to bypass Microsoft AppLocker and similar executable control policies. The project functions as a living catalog: entries list binaries, script hosts, and patterns that researchers have tested or reported in the wild, along with notes about context, platform constraints, and mitigation ideas. It is aimed primarily at defenders, incident responders, and security researchers who need a consolidated reference to understand common bypass vectors and to validate detection logic. The repository emphasizes defensive use—helping blue teams craft allow-list policies, create detection rules, and test policy hardening in isolated lab environments—rather than offensive exploitation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Linxup Dash Cam for Fleet Management Icon
    Linxup Dash Cam for Fleet Management

    For companies with vehicles, fleets, assets, or equipment to track, from one piece to thousands.

    Linxup is a leading provider of vehicle and asset tracking solutions for fleets and service companies in a variety of industries. Linxup delivers powerful but easy to use GPS solutions through a software-as-a-service (SaaS) platform. Our data gives businesses the tools they need to improve fleet management, increase mobile worker productivity, and reduce operating costs. Specialty products such as lawn mower tracking and dash cameras give customers every tool they need to improve, grow, and protect their businesse
    Learn More
  • 5
    Penetration Testing Tools

    Penetration Testing Tools

    A collection of more than 170+ tools, scripts, cheatsheets

    ...The repository groups resources by discipline — reconnaissance, web application testing, network exploitation, privilege escalation, post-exploitation and reporting — so users can quickly find relevant utilities and walkthroughs. Many entries include short usage notes, common command examples, and links to upstream projects or writeups, turning the repo into both a toolbox and a practical learning library. The collection emphasizes tooling that is easy to run in lab environments and often points to small scripts and one-file utilities that accelerate common tasks like service discovery, credential harvesting, or privilege checks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Windows Dev Box Setup Scripts

    Windows Dev Box Setup Scripts

    Scripts to simplify setting up a Windows developer box

    ...Scripts are organized as high-level recipes (for example: Full Desktop App, Web, Web + NodeJS, Machine Learning, DevOps/Azure) which call smaller helper scripts stored in a scripts/ folder so recipes stay readable and easy to customize. The README documents how to run recipes, notes for WSL users, guidance for organizational or classroom use (including ways to adapt scripts to air-gapped environments), and known issues and workarounds encountered with the Boxstarter web launcher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Thanos.sh

    Thanos.sh

    if you are Thanos(root), this command could delete half your files

    ...It ships as a shell script plus a PowerShell variant (Invoke-Thanos.ps1) that can target files, environment variables, registry entries, functions, aliases and certificates, and the repository warns repeatedly not to run it casually. The project includes short installation notes (for example, macOS requires gshuf from coreutils) and a README that frames the script as a “real gun” that should be used with extreme caution. By design the repo is blunt and provocative: it contains a Story.md for user anecdotes, and the README even notes the script only displays how many files would be deleted in one run. The codebase is mainly PowerShell and shell, licensed MIT, and has attracted attention and stars as a curiosity / research / prank tool rather than a production utility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Active Directory Exploitation

    Active Directory Exploitation

    A cheat sheet that contains common enumeration and attack methods

    ...It aggregates short, copy-ready PowerShell, C, .NET and Python snippets as well as command examples so operators can quickly run checks or reproduce techniques in lab environments. The content also includes .NET payload patterns, reverse PowerShell helpers, notes on privileged accounts and groups, and practical tips for hunting or protecting high-value targets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next