π¦ discovering and attacking IoT devices based on web attacks full guide by Undercode
4 K hd- java Objects & Classes Detailed
https://www.youtube.com/watch?v=84hGoR9HjAY
For more youtube.com/Undercode
https://www.youtube.com/watch?v=84hGoR9HjAY
For more youtube.com/Undercode
YouTube
JAVA Course Objects& Classes all you need to know (ARABIC-ENGLISH Training)
FOR MORE VISIT: https://www.UndercodeTesting.com
ΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩ
To watch more videos, please subscribe to the channel Youtube.com/Undercode
You can also followβ¦
ΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩ
To watch more videos, please subscribe to the channel Youtube.com/Undercode
You can also followβ¦
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WARNING #HackersToday
> Hackers use graphical verification to flicker real people download malicious files and evade automated detection
1) The Microsoft security intelligence team recently exposed the new trend of the hacker organization CHIMBORAZO.
2) As the behind-the-scenes hands of Dudear and GraceWire, the information theft Trojan, it once again looked at the CAPTCHA graphic verification code used by major websites for real-person detection .
3) Compared with fuzzy, distorted numbers or letters, the graphic verification codes that have been online for more than ten years can block many people with ulterior
4) The Microsoft Security Intelligence team pointed out that their tracking analysis from January this year found that the organization has distributed malicious Excel documents on sites that require users to complete CAPTCHA verification.
@UndercodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WARNING #HackersToday
> Hackers use graphical verification to flicker real people download malicious files and evade automated detection
1) The Microsoft security intelligence team recently exposed the new trend of the hacker organization CHIMBORAZO.
2) As the behind-the-scenes hands of Dudear and GraceWire, the information theft Trojan, it once again looked at the CAPTCHA graphic verification code used by major websites for real-person detection .
3) Compared with fuzzy, distorted numbers or letters, the graphic verification codes that have been online for more than ten years can block many people with ulterior
4) The Microsoft Security Intelligence team pointed out that their tracking analysis from January this year found that the organization has distributed malicious Excel documents on sites that require users to complete CAPTCHA verification.
@UndercodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦MAKE YOUR SITE APPEARS ON GOOGLE #REQUESTED :
- Simple random DNS, HTTP/S internet traffic noise generator
1οΈβ£git clone https://github.com/1tayH/noisy.git
2οΈβ£cd noisy
3οΈβ£pip install requests
4οΈβ£python noisy.py --config config.json
5οΈβ£$ python noisy.py --help
usage: noisy.py [-h] [--log -l] --config -c [--timeout -t]
π¦optional arguments:
-h, --help show this help message and exit
--log -l logging level
--config -c config file
--timeout -t for how long the crawler should be running, in seconds
π¦Build Using Docker
Build the image
1οΈβ£docker build -t noisy .
Or if you'd like to build it for a Raspberry Pi (running Raspbian stretch):
2οΈβ£docker build -f Dockerfile.pi -t noisy .
Create the container and run:
3οΈβ£docker run -it noisy --config config.json
β topic 2020 git
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦MAKE YOUR SITE APPEARS ON GOOGLE #REQUESTED :
- Simple random DNS, HTTP/S internet traffic noise generator
1οΈβ£git clone https://github.com/1tayH/noisy.git
2οΈβ£cd noisy
3οΈβ£pip install requests
4οΈβ£python noisy.py --config config.json
5οΈβ£$ python noisy.py --help
usage: noisy.py [-h] [--log -l] --config -c [--timeout -t]
π¦optional arguments:
-h, --help show this help message and exit
--log -l logging level
--config -c config file
--timeout -t for how long the crawler should be running, in seconds
π¦Build Using Docker
Build the image
1οΈβ£docker build -t noisy .
Or if you'd like to build it for a Raspberry Pi (running Raspbian stretch):
2οΈβ£docker build -f Dockerfile.pi -t noisy .
Create the container and run:
3οΈβ£docker run -it noisy --config config.json
β topic 2020 git
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - 1tayH/noisy: Simple random DNS, HTTP/S internet traffic noise generator
Simple random DNS, HTTP/S internet traffic noise generator - 1tayH/noisy
Again whatsapp face new issue online-offline & status starting in india and now all contries : error not determined till now
Forwarded from UNDERCODE SECURITY
π¦ As Russians Say: Why whatsapp have issue now :
1) New feature, users will be able to choose the date of sending or receiving a message by clicking on the calendar icon in search mode. According to WABetaInfo, now the innovation is at the alpha testing stage.
2) At the end of April, WhatsApp doubled the number of people who can simultaneously participate in audio and video calls. Thus, the number of possible participants in group calls increased from four to eight
.....
1) New feature, users will be able to choose the date of sending or receiving a message by clicking on the calendar icon in search mode. According to WABetaInfo, now the innovation is at the alpha testing stage.
2) At the end of April, WhatsApp doubled the number of people who can simultaneously participate in audio and video calls. Thus, the number of possible participants in group calls increased from four to eight
.....
UNDERCODE SECURITY
π¦ As Russians Say: Why whatsapp have issue now : 1) New feature, users will be able to choose the date of sending or receiving a message by clicking on the calendar icon in search mode. According to WABetaInfo, now the innovation is at the alpha testingβ¦
In April corona comes, and they work on this now
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Share five free enterprise network intrusion detection (IDS) tools
1οΈβ£Security Onion
Security Onion is an Ubuntu-based Linux distribution for network monitoring and intrusion detection. The image can be distributed as a sensor in the network to monitor multiple VLANs and subnets, which is very suitable for VMware and virtual environments. This configuration can only be used as an IDS and cannot currently be operated as an IPS. However, you can choose to use it as a network and host intrusion detection deployment, and use Squil, Bro IDS, and OSSEC services to perform the IDS function of the service. The tool's wiki information and documentation information is very rich, and vulnerabilities and errors are also recorded and reviewed. Although Security Onion is powerful, it still needs to continue to develop, of course, it takes time.
2οΈβ£OSSEC
OSSEC is an open source host intrusion detection system (HIDS), its function is not just intrusion detection. Like most open source IDS products, there are a variety of additional modules that can combine the core functions of the IDS. In addition to network intrusion detection, the OSSEC client can perform file integrity monitoring and rootkit detection, and has real-time alarms. These functions are all centralized management, and can create different policies according to the needs of enterprises. The OSSEC client runs locally on most operating systems, including Linux versions, Mac OSX, and Windows. It also provides commercial support through Trend Microβs global support team, which is a very mature product.
3οΈβ£OpenWIPS-NG
OpenWIPS-NG is a free wireless IDS/IPS, which relies on servers, sensors and interfaces. It can run on ordinary hardware. Its creator is the developer of Aircrack-NG. The system uses many of Aircrack-NG's built-in functions and services for scanning, detection, and intrusion prevention. OpenWIPS-NG is modular and allows administrators to download plug-ins to add functionality. Its documentation is not as detailed as some systems, but it allows companies to execute WIPS under tight budgets.
4οΈβ£Suricata
Of all the currently available IDS/IPS systems, Suricata is best able to compete with Snort. The system has a Snort-like architecture that relies on signatures like Snort, and can even use the same set of Emerging Threat rules as VRT Snort rules and Snort itself. Suricata is newer than Snort and it will have a chance to overtake Snort. If Snort is not your business choice, this free tool is best for running on your business network.
5οΈβ£Bro IDS
Bro IDS is similar to Security Onion, it uses more IDS rules to determine the source of the attack. Bro IDS uses a combination of tools. It used to convert Snort-based signatures to Bro signatures, but this is no longer the case. Now users can write custom signatures for Bro IDS. The system has a lot of detailed document information and has a history of more than 15 years.
π¦ In most IDS/IPS markets (including free software and open source IDS/IPS), Snort is undoubtedly the most influential tool. The systems described in this undercode tutorial implement IDS/IPS a bit differently, but they are all practical and free tools. Cost-saving companies can use these tools to better protect their networks
Written @UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Share five free enterprise network intrusion detection (IDS) tools
1οΈβ£Security Onion
Security Onion is an Ubuntu-based Linux distribution for network monitoring and intrusion detection. The image can be distributed as a sensor in the network to monitor multiple VLANs and subnets, which is very suitable for VMware and virtual environments. This configuration can only be used as an IDS and cannot currently be operated as an IPS. However, you can choose to use it as a network and host intrusion detection deployment, and use Squil, Bro IDS, and OSSEC services to perform the IDS function of the service. The tool's wiki information and documentation information is very rich, and vulnerabilities and errors are also recorded and reviewed. Although Security Onion is powerful, it still needs to continue to develop, of course, it takes time.
2οΈβ£OSSEC
OSSEC is an open source host intrusion detection system (HIDS), its function is not just intrusion detection. Like most open source IDS products, there are a variety of additional modules that can combine the core functions of the IDS. In addition to network intrusion detection, the OSSEC client can perform file integrity monitoring and rootkit detection, and has real-time alarms. These functions are all centralized management, and can create different policies according to the needs of enterprises. The OSSEC client runs locally on most operating systems, including Linux versions, Mac OSX, and Windows. It also provides commercial support through Trend Microβs global support team, which is a very mature product.
3οΈβ£OpenWIPS-NG
OpenWIPS-NG is a free wireless IDS/IPS, which relies on servers, sensors and interfaces. It can run on ordinary hardware. Its creator is the developer of Aircrack-NG. The system uses many of Aircrack-NG's built-in functions and services for scanning, detection, and intrusion prevention. OpenWIPS-NG is modular and allows administrators to download plug-ins to add functionality. Its documentation is not as detailed as some systems, but it allows companies to execute WIPS under tight budgets.
4οΈβ£Suricata
Of all the currently available IDS/IPS systems, Suricata is best able to compete with Snort. The system has a Snort-like architecture that relies on signatures like Snort, and can even use the same set of Emerging Threat rules as VRT Snort rules and Snort itself. Suricata is newer than Snort and it will have a chance to overtake Snort. If Snort is not your business choice, this free tool is best for running on your business network.
5οΈβ£Bro IDS
Bro IDS is similar to Security Onion, it uses more IDS rules to determine the source of the attack. Bro IDS uses a combination of tools. It used to convert Snort-based signatures to Bro signatures, but this is no longer the case. Now users can write custom signatures for Bro IDS. The system has a lot of detailed document information and has a history of more than 15 years.
π¦ In most IDS/IPS markets (including free software and open source IDS/IPS), Snort is undoubtedly the most influential tool. The systems described in this undercode tutorial implement IDS/IPS a bit differently, but they are all practical and free tools. Cost-saving companies can use these tools to better protect their networks
Written @UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦New features of V12 version of the computer file anti-leakage system are as follows:
1οΈβ£The function of automatically isolating unauthorized computers to prevent external computers or mobile devices from accessing the Internet;
2οΈβ£ The function of only allowing intranet whitelist MAC addresses to access each other to prevent external computers from privately accessing intranet computers;
3οΈβ£All online host scans on the LAN Function, and support the function of exporting and importing MAC addresses
4οΈβ£ The administrator can manually set the function that no longer isolates the external computer
5οΈβ£The administrator can add/delete the MAC address of the intranet white list;
6οΈβ£ The administrator can set the permission Unauthorized computer access to intranet
Written @UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦New features of V12 version of the computer file anti-leakage system are as follows:
1οΈβ£The function of automatically isolating unauthorized computers to prevent external computers or mobile devices from accessing the Internet;
2οΈβ£ The function of only allowing intranet whitelist MAC addresses to access each other to prevent external computers from privately accessing intranet computers;
3οΈβ£All online host scans on the LAN Function, and support the function of exporting and importing MAC addresses
4οΈβ£ The administrator can manually set the function that no longer isolates the external computer
5οΈβ£The administrator can add/delete the MAC address of the intranet white list;
6οΈβ£ The administrator can set the permission Unauthorized computer access to intranet
Written @UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ why should hackers suppress router DNS?
1) After the router is controlled, the DNS location of the router can be changed, so that the user's homepage can be controlled, so that he can actively jump and pull out the pop-up window confession and other certain confession fees and traffic fees;
2) After controlling the router, it can monitor the application status of users connected to the wireless network, so as to steal user account information, especially bank account information;
3) The user should take the initiative to jump off the link implanted with the Trojan virus when reading the web page. The user should be recruited to stop the billing or hacking;
π¦How to invent routers in real time can be suppressed?
1) Introspect the DNS location of the router and reflect the location pointed to by the DNS. If the DNS setting in the router's DHCP is 66.102.*.* or 207.254.*.*, it means that it has been suppressed;
2) Reflect the number of access equipment, log in to the router management interface, and reflect on the number of equipment connected to the wireless network. If there is rusty equipment, it may be suppressed;
3) When you read the webpage, it starts to show active jumps, pop-ups and more confession;
4) Introspect whether the manual setting of DNS server option in the high-end settings of router settings can be checked, if it is checked, it has been stated that it has been suppressed;
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ why should hackers suppress router DNS?
1) After the router is controlled, the DNS location of the router can be changed, so that the user's homepage can be controlled, so that he can actively jump and pull out the pop-up window confession and other certain confession fees and traffic fees;
2) After controlling the router, it can monitor the application status of users connected to the wireless network, so as to steal user account information, especially bank account information;
3) The user should take the initiative to jump off the link implanted with the Trojan virus when reading the web page. The user should be recruited to stop the billing or hacking;
π¦How to invent routers in real time can be suppressed?
1) Introspect the DNS location of the router and reflect the location pointed to by the DNS. If the DNS setting in the router's DHCP is 66.102.*.* or 207.254.*.*, it means that it has been suppressed;
2) Reflect the number of access equipment, log in to the router management interface, and reflect on the number of equipment connected to the wireless network. If there is rusty equipment, it may be suppressed;
3) When you read the webpage, it starts to show active jumps, pop-ups and more confession;
4) Introspect whether the manual setting of DNS server option in the high-end settings of router settings can be checked, if it is checked, it has been stated that it has been suppressed;
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to protect against router DNS control?
1) Change the initial password and set the password to be more complicated;
2) Real-time upgrade router firmware patch to repair bare flaws;
3) Initialize the router completely, after clearing the previous settings and equipment, change the password and upgrade the firmware of the router, etc.;
4) Device security software monitors network security
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
1) Change the initial password and set the password to be more complicated;
2) Real-time upgrade router firmware patch to repair bare flaws;
3) Initialize the router completely, after clearing the previous settings and equipment, change the password and upgrade the firmware of the router, etc.;
4) Device security software monitors network security
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 few days- Hide secrets with invisible characters in plain text securely using passwords
π¦ Features :
1)Protect your invisible secret using passwords and HMAC integrity
2)Cryptographically secure by encrypting the invisible secret using AES-256-CTR.
3) Uses 6 Invisible characters in unicode characters that works everywhere in the web.
4) Including the most important ones Tweets, Gmail, Whatsapp, Telegram, Instagram, Facebook etc.
5) Maximum Compression to reduce the payload (LZ, Huffman).
6) Completely invisible, uses Zero Width Characters instead of white spaces or tabs.
7) Super fast! Hides the Wikipedia page-source for steganography (800 lines and 205362 characters) within a covertext of 3 words in under one second.
8) Hiding files in strings can be achieved by uploading the file to cloud and stegcloaking the link in the string
9) Written in pure functional style.
>Available as an API module, a CLI and also a Web Interface (optimized with web workers).
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/KuroLabs/stegcloak.git
2) $ npm install -g stegcloak
Using npm (to use it locally in your program),
3) $ npm install stegcloak
4) for hide Hide
$ stegcloak hide
5) Reveal
$ stegcloak reveal
π¦API Usage
const StegCloak = require('stegcloak');
const stegcloak = new StegCloak(true, false); // Initializes with encryption true and hmac false for hiding
// These arguments are used only during hide
// Can be changed later by switching boolean flags for stegcloak.encrypt and stegcloak.integrity
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 few days- Hide secrets with invisible characters in plain text securely using passwords
π¦ Features :
1)Protect your invisible secret using passwords and HMAC integrity
2)Cryptographically secure by encrypting the invisible secret using AES-256-CTR.
3) Uses 6 Invisible characters in unicode characters that works everywhere in the web.
4) Including the most important ones Tweets, Gmail, Whatsapp, Telegram, Instagram, Facebook etc.
5) Maximum Compression to reduce the payload (LZ, Huffman).
6) Completely invisible, uses Zero Width Characters instead of white spaces or tabs.
7) Super fast! Hides the Wikipedia page-source for steganography (800 lines and 205362 characters) within a covertext of 3 words in under one second.
8) Hiding files in strings can be achieved by uploading the file to cloud and stegcloaking the link in the string
9) Written in pure functional style.
>Available as an API module, a CLI and also a Web Interface (optimized with web workers).
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/KuroLabs/stegcloak.git
2) $ npm install -g stegcloak
Using npm (to use it locally in your program),
3) $ npm install stegcloak
4) for hide Hide
$ stegcloak hide
5) Reveal
$ stegcloak reveal
π¦API Usage
const StegCloak = require('stegcloak');
const stegcloak = new StegCloak(true, false); // Initializes with encryption true and hmac false for hiding
// These arguments are used only during hide
// Can be changed later by switching boolean flags for stegcloak.encrypt and stegcloak.integrity
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - KuroLabs/stegcloak: Hide secrets with invisible characters in plain text securely using passwords π§π»ββοΈβ
Hide secrets with invisible characters in plain text securely using passwords π§π»ββοΈβ - GitHub - KuroLabs/stegcloak: Hide secrets with invisible characters in plain text securely using passwords π§π»ββοΈβ
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Monitoring 2020
- [Logspout](https://github.com/gliderlabs/logspout) - Log routing for Docker container logs by [@gliderlabs][gliderlabs]
- [Out-of-the-box Host/Container Monitoring/Logging/Alerting Stack](https://github.com/uschtwill/docker_monitoring_logging_alerting) - Docker host and container monitoring, logging and alerting out of the box using cAdvisor, Prometheus, Grafana for monitoring, Elasticsearch, Kibana and Logstash for logging and elastalert and Alertmanager for alerting. Set up in 5 Minutes. Secure mode for production use with built-in [Automated Nginx Reverse Proxy (jwilder's)][nginxproxy].
- [Zabbix Docker module](https://github.com/monitoringartist/Zabbix-Docker-Monitoring) - Zabbix module that provides discovery of running containers, CPU/memory/blk IO/net container metrics. Systemd Docker and LXC execution driver is also supported. It's a dynamically linked shared object library, so its performance is (~10x) better, than any script solution.
- [Zabbix Docker](https://github.com/gomex/docker-zabbix) - Monitor containers automatically using zabbix LLD feature.
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Monitoring 2020
- [Logspout](https://github.com/gliderlabs/logspout) - Log routing for Docker container logs by [@gliderlabs][gliderlabs]
- [Out-of-the-box Host/Container Monitoring/Logging/Alerting Stack](https://github.com/uschtwill/docker_monitoring_logging_alerting) - Docker host and container monitoring, logging and alerting out of the box using cAdvisor, Prometheus, Grafana for monitoring, Elasticsearch, Kibana and Logstash for logging and elastalert and Alertmanager for alerting. Set up in 5 Minutes. Secure mode for production use with built-in [Automated Nginx Reverse Proxy (jwilder's)][nginxproxy].
- [Zabbix Docker module](https://github.com/monitoringartist/Zabbix-Docker-Monitoring) - Zabbix module that provides discovery of running containers, CPU/memory/blk IO/net container metrics. Systemd Docker and LXC execution driver is also supported. It's a dynamically linked shared object library, so its performance is (~10x) better, than any script solution.
- [Zabbix Docker](https://github.com/gomex/docker-zabbix) - Monitor containers automatically using zabbix LLD feature.
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - gliderlabs/logspout: Log routing for Docker container logs
Log routing for Docker container logs. Contribute to gliderlabs/logspout development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 dockers for #Developers :
- CaptainDuckDuck - Open source Heroku-like platform with a one-liner installer and a GUI for managing apps - with serveral one-click databases and apps.
- Convox Rack - Convox Rack is open source PaaS built on top of expert infrastructure automation and devops best practices.
- Dcw - Docker-compose SSH wrapper: a very poor man PaaS, exposing the docker-compose and custom-container commands defined in container labels.
- Dokkudokku - Docker powered mini-Heroku that helps you build and manage the lifecycle of applications (originally by @progriumprogrium)
- Empire - A PaaS built on top of Amazon EC2 Container Service (ECS)
- Flynn - A next generation open source platform as a service
- OpenShiftopenshift - An open source PaaS built on Kuberneteskubernetes and optimized for Dockerized app development and deployment by Red Hat
- Tsuru - Tsuru is an extensible and open source Platform as a Service software
- Workflow - The open source PaaS for Kubernetes by Deis. Formerly Deis v1.
π¦2020 dockers for #Developers :
- CaptainDuckDuck - Open source Heroku-like platform with a one-liner installer and a GUI for managing apps - with serveral one-click databases and apps.
- Convox Rack - Convox Rack is open source PaaS built on top of expert infrastructure automation and devops best practices.
- Dcw - Docker-compose SSH wrapper: a very poor man PaaS, exposing the docker-compose and custom-container commands defined in container labels.
- Dokkudokku - Docker powered mini-Heroku that helps you build and manage the lifecycle of applications (originally by @progriumprogrium)
- Empire - A PaaS built on top of Amazon EC2 Container Service (ECS)
- Flynn - A next generation open source platform as a service
- OpenShiftopenshift - An open source PaaS built on Kuberneteskubernetes and optimized for Dockerized app development and deployment by Red Hat
- Tsuru - Tsuru is an extensible and open source Platform as a Service software
- Workflow - The open source PaaS for Kubernetes by Deis. Formerly Deis v1.
GitHub
GitHub - caprover/caprover: Scalable PaaS (automated Docker+nginx) - aka Heroku on Steroids
Scalable PaaS (automated Docker+nginx) - aka Heroku on Steroids - caprover/caprover