Showing 2 open source projects for "tagging"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    Claude Code

    Claude Code

    Claude Code is an agentic coding tool that lives in your terminal

    ...It helps developers code faster by executing routine tasks, explaining complex code snippets, and managing git workflows—all via natural language commands. Claude Code integrates seamlessly into your terminal, IDE, or GitHub by tagging @claude to interact with your code context. The tool is designed to simplify development by automating repetitive work and providing instant clarifications on code behavior. User feedback and usage data are collected responsibly, with strict privacy safeguards and limited retention, ensuring no feedback is used to train generative models. ...
    Downloads: 674 This Week
    Last Update:
    See Project
  • 2
    Active Directory Exploitation

    Active Directory Exploitation

    A cheat sheet that contains common enumeration and attack methods

    Active-Directory-Exploitation-Cheat-Sheet is a comprehensive, community-curated cheat sheet that collects practical enumeration commands, attack techniques, and quick references for attacking and auditing Windows Active Directory environments. The repository is organized as a stepwise kill-chain: recon, domain enumeration, local privilege escalation, user hunting, BloodHound guidance, lateral movement, persistence, domain-admin takeover, cross-trust attacks, data exfiltration, and a toolbox...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB