Filter By

Package Types

Operating System

Categories

Trust Information

By: | 6,905,888 downloads | Last Updated: 9/25/2024 | Latest Version: 1.12.346

General Scripting Framework, providing PowerShell-specific infrastructure for other modules.

By: | 1,055,668 downloads | Last Updated: 11/11/2024 | Latest Version: 1.40.0-B0147

Validate Azure resources and infrastructure as code using PSRule. This project uses GitHub Issues to track bugs and feature requests. See GitHub project for more information.

By: | 96,788 downloads | Last Updated: 10/21/2019 | Latest Version: 2.2.8

Infrastructure Testing DSL running in Pester

By: | 99,426 downloads | Last Updated: 9/28/2024 | Latest Version: 0.0.90

Testimo is Powershell module that tests Active Directory against specific set of tests.

By: | 19,237 downloads | Last Updated: 5/29/2019 | Latest Version: 1.2.1

A set of tools for executing validation of the operation of a system. It provides a way to organize and execute Pester tests which are written to validate operation (rather than limited feature tests)

By: | 1,188 downloads | Last Updated: 7/13/2018 | Latest Version: 1.0

This module offers a set of tools to manage Cisco network devices.

By: | 1,005 downloads | Last Updated: 2/9/2017 | Latest Version: 1.2.1

Infrastructure test runner using Pester

By: | 834 downloads | Last Updated: 8/27/2018 | Latest Version: 1.1.1

This module offers a set of tools to manage IP networks and devices.

By: | 977 downloads | Last Updated: 7/25/2018 | Latest Version: 1.0.1

This module offers a set of tools to manage Windows environment, such as servers and network services.

By: | 677 downloads | Last Updated: 12/18/2018 | Latest Version: 1.1.0

Basic HTTP listener written in PowerShell that executes Operation Validation Framework (OVF) tests and returns results using a simple REST API

By: | 9 downloads | Last Updated: 10/14/2024 | Latest Version: 0.34.2

Tasks and functions required by AD in order to maintain the environment clean and secured. Some of these tasks may include finding unused user objects or computers, creating semi-privileged accounts or monitoring privileged groups.