- Cork, Ireland
- @vonkinder
Stars
Ansible Role - Jenk 8000 ins CI
Unauthenticated enumeration of AWS, Azure, and GCP Principals
Protocol Buffers - Google's data interchange format
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
Shopify's Dawn theme with CI/CD pipeline for automatic minification.
A vulnerability scanner for container images and filesystems
Vitess is a database clustering system for horizontal scaling of MySQL.
Carbon Language's main repository: documents, design, implementation, and related tools. (NOTE: Carbon Language is experimental; see README)
This tool is designed to help automate the migration from one TFC/E Organization to another, whether that’s TFE to TFC, or vice versa.
Simple script to export current AWS SSO credentials or run a sub-process with them
ARA Records Ansible and makes it easier to understand and troubleshoot.
Terraform Cloud Secrets Backend for Vault
Export/Import Org Data. Import from CSV files
discogs-oauth-example was created to provide a very basic but functioning example of how a developer may utilize the python oauth2 library to download images and make authenticated calls against th…
Template rendering, notifier, and supervisor for @HashiCorp Consul and Vault data.
Faster way to switch between clusters and namespaces in kubectl
Repository for F5 Container Ingress Services for Kubernetes & OpenShift.
GitHub Action for Ansible roles testing using Molecule
A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP…
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Curated list of resources on HashiCorp's Terraform and OpenTofu
Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuos monitoring, security assessments and audits, incident response, compliance, harden…
Boundary enables identity-based access management for dynamic infrastructure.
q - Run SQL directly on delimited files and multi-file sqlite databases