Showing 10 open source projects for "ace-step-1.5"

View related business solutions
  • Corporate Compliance Software | Skillcast Icon
    Corporate Compliance Software | Skillcast

    Trusted by 1,400+ companies to simplify compliance

    Skillcast delivers compliance training and RegTech through a unified Compliance Portal that brings e-learning, Policy Hub (versioning & attestations), staff declarations, compliance registers, CPD/Training 360 and Events Management in one place.
    Learn More
  • The CRM you will want to use every day Icon
    The CRM you will want to use every day

    With CRM, Sales, and Marketing Automation in one, Act! gives you everything you need for happier clients, more revenue, and less stress.

    Act! Premium is perfect for small and midsize businesses looking to market better, sell more, and create customers for life. With unparalleled flexibility and freedom of choice, Act! Premium accommodates the unique ways you do business. Whether it’s customizations to fit your specific business or industry processes or your preferences for deployment and access, the possibilities with Act! Premium are limitless.
    Learn More
  • 1
    Generative AI for Beginners .NET

    Generative AI for Beginners .NET

    Hands-on .NET course for building real-world generative AI apps

    ...It walks through core concepts such as text generation, chat-based interactions, and integrating large language models into applications. Each lesson includes short videos, working code samples, and step-by-step instructions, making it easy to follow and apply immediately. Generative AI for Beginners .NET supports tools like GitHub Models, Azure OpenAI Service, and local models, giving flexibility in how projects are built and tested. Developers can run examples locally or in cloud-based environments such as GitHub Codespaces. It focuses on practical implementation rather than theory, helping users move from simple experiments to complete AI-powered solutions while understanding responsible AI usage and modern development workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    AzureAD Attack Defense

    AzureAD Attack Defense

    This publication is a collection of various common attack scenarios

    AzureAD-Attack-Defense is a community-maintained playbook that collects common attack scenarios against Microsoft Entra ID (formerly Azure Active Directory) together with detection and mitigation guidance. The repository is organized into focused chapters — for example: Password Spray, Consent Grant, Service Principals in Azure DevOps, Entra Connect Sync Service Account, Replay of Primary Refresh Token (PRT), Entra ID Security Config Analyzer, and Adversary-in-the-Middle — each written to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Fast-Kubernetes

    Fast-Kubernetes

    This repo covers Kubernetes with LABs: Kubectl, Pod, Deployment

    Fast-Kubernetes is a practical, hands-on repository that explains Kubernetes concepts and walks users through dozens of bite-size labs and examples. The content is organized as Markdown how-tos and cheat-sheets covering core objects and workflows — Pods, Deployments, Services, ConfigMaps, Secrets, PV/PVC, StatefulSets, DaemonSets, Jobs/CronJobs, Ingress, affinity/taints, and more — plus command-line kubectl quick references. It also includes end-to-end cluster setup guides (kubeadm with...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Bear Stone Smart Home

    Bear Stone Smart Home

    Custom Home Assistant configuration with automations and scripts setup

    Bear Stone Smart Home contains a personalized configuration setup for Home Assistant, an open source home automation platform. It defines how various smart home devices, services, and integrations are organized and controlled within a single environment. It includes configuration files that manage entities such as lights, sensors, switches, and media devices, enabling centralized automation and monitoring. It demonstrates how to structure Home Assistant YAML files for scalability and...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Secure your business by securing your people. Icon
    Secure your business by securing your people.

    Over 100,000 businesses trust 1Password

    Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.
    Learn More
  • 5
    Agent Framework

    Agent Framework

    Framework for building, orchestrating, and deploying AI agents

    ...Microsoft Agent Framework supports graph-based orchestration that enables developers to connect agents, functions, and tools into structured workflows capable of handling multi-step processes. It also includes components such as agent sessions for managing state, context providers for maintaining memory, and middleware for intercepting and extending agent behavior. Developers can integrate external tools and services so that agents can execute actions beyond text generation.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Thanos.sh

    Thanos.sh

    if you are Thanos(root), this command could delete half your files

    Thanos.sh is a small—but dangerous—tool that randomly deletes roughly half of the files on a system (hence the name). It ships as a shell script plus a PowerShell variant (Invoke-Thanos.ps1) that can target files, environment variables, registry entries, functions, aliases and certificates, and the repository warns repeatedly not to run it casually. The project includes short installation notes (for example, macOS requires gshuf from coreutils) and a README that frames the script as a “real...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Penetration Testing Tools

    Penetration Testing Tools

    A collection of more than 170+ tools, scripts, cheatsheets

    Penetration-Testing-Tools is a curated collection of tools, scripts, cheatsheets and reference materials assembled to help security researchers, red-teamers, and students perform hands-on penetration testing across multiple domains. The repository groups resources by discipline — reconnaissance, web application testing, network exploitation, privilege escalation, post-exploitation and reporting — so users can quickly find relevant utilities and walkthroughs. Many entries include short usage...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 8
    windows-development-environment

    windows-development-environment

    Turning Windows into an environment ready for modern development

    ...It focuses on automating the installation and configuration of key tools, shells, editors, package managers, and utilities so developers can transform a fresh Windows installation into a robust workstation with minimal manual effort. Instead of piecing together individual tutorials, the repository provides curated scripts, recommended tooling configurations, and step-by-step instructions that cover everything from PowerShell and Windows Subsystem for Linux (WSL) to code editors like VS Code, and from package managers (e.g., Scoop/Chocolatey) to Docker and Git workflows. By codifying these patterns, it reduces onboarding time and ensures consistency in dev setups — especially valuable for teams that want standardized tooling across Windows boxes.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9

    Sihas

    Helps you to ensure your cyber security through cyber hygiene

    Deffend.net Sihas aims to help small companies and individuals to avoid cyber security threats through cyber hygiene. It runs on Windows desktop and looks for misconfigurations that may result in cyber security risks. Ensuring cyber hygiene is the first step of preventing cyber security threats. Sihas will help to individuals who lack cyber security knowledge and to companies who can not afford getting cyber security consultancy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Caller ID Reputation provides the most comprehensive view of your caller ID scores across all carriers Icon
    Caller ID Reputation provides the most comprehensive view of your caller ID scores across all carriers

    Instantly identify flagged caller IDs and decrease flags by up to 95% your first month.

    Keep your agents on the phone with increased connection rates by monitoring your phone number reputation across all major carriers and call blocking apps.
    Learn More
  • 10
    Deffend.net Otus

    Deffend.net Otus

    Helps you to ensure your cyber security through cyber hygiene

    Deffend.net Otus aims to help small companies and individuals to avoid cyber security threats through cyber hygiene. It runs on Windows desktop and looks for misconfigurations that may result in cyber security risks. Ensuring cyber hygiene is the first step of preventing cyber security threats. Otus will help to individuals who lack cyber security knowledge and to companies who can not afford getting cyber security consultancy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB