Pinned Repositories
30-Days-Of-Python
30 days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than100 days, follow your own pace. These videos may help too: https://www.youtube.com/channel/UC7PNRuno1rzYPb1xLa4yktw
docker-radicale
Run radicale in docker container
kubernetes-the-hard-way
Bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts.
letterbytes
Converting german paper letters into digital bytes!
minica
minica is a small, simple CA intended for use in situations where the CA operator also operates each host where a certificate will be used.
Penetration-Testing
List of awesome penetration testing resources, tools and other shiny things
practical-python
Practical Python Programming (course by @dabeaz)
python-mastery
Advanced Python Mastery (course by @dabeaz)
rancher-docs
Rancher Documentation
trident
Storage orchestrator for containers
roycec's Repositories
roycec/docker-radicale
Run radicale in docker container
roycec/trident
Storage orchestrator for containers
roycec/30-Days-Of-Python
30 days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than100 days, follow your own pace. These videos may help too: https://www.youtube.com/channel/UC7PNRuno1rzYPb1xLa4yktw
roycec/kubernetes-the-hard-way
Bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts.
roycec/letterbytes
Converting german paper letters into digital bytes!
roycec/minica
minica is a small, simple CA intended for use in situations where the CA operator also operates each host where a certificate will be used.
roycec/Penetration-Testing
List of awesome penetration testing resources, tools and other shiny things
roycec/practical-python
Practical Python Programming (course by @dabeaz)
roycec/python-mastery
Advanced Python Mastery (course by @dabeaz)
roycec/rancher-docs
Rancher Documentation
roycec/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
roycec/systemd-workshop