Filter By
Displaying results 1 - 13 of 13 (Page 1 of 1)
By:
|
7,005,608 downloads
|
Last Updated: 9/25/2024
|
Latest Version: 1.12.346
General Scripting Framework, providing PowerShell-specific infrastructure for other modules. |
By:
|
1,074,019 downloads
|
Last Updated: 11/11/2024
|
Latest Version: 1.40.0-B0147
Validate Azure resources and infrastructure as code using PSRule. This project uses GitHub Issues to track bugs and feature requests. See GitHub project for more information. |
By:
|
100,787 downloads
|
Last Updated: 9/28/2024
|
Latest Version: 0.0.90
Testimo is Powershell module that tests Active Directory against specific set of tests. |
By:
|
19,451 downloads
|
Last Updated: 5/29/2019
|
Latest Version: 1.2.1
A set of tools for executing validation of the operation of a system. It provides a way to organize and execute Pester tests which are written to validate operation (rather than limited feature tests) |
By:
|
1,190 downloads
|
Last Updated: 7/13/2018
|
Latest Version: 1.0
This module offers a set of tools to manage Cisco network devices. |
By:
|
1,006 downloads
|
Last Updated: 2/9/2017
|
Latest Version: 1.2.1
Infrastructure test runner using Pester |
By:
|
839 downloads
|
Last Updated: 8/27/2018
|
Latest Version: 1.1.1
This module offers a set of tools to manage IP networks and devices. |
By:
|
1,011 downloads
|
Last Updated: 7/25/2018
|
Latest Version: 1.0.1
This module offers a set of tools to manage Windows environment, such as servers and network services. |
By:
|
678 downloads
|
Last Updated: 12/18/2018
|
Latest Version: 1.1.0
Basic HTTP listener written in PowerShell that executes Operation Validation Framework (OVF) tests and returns results using a simple REST API |
By:
|
466 downloads
|
Last Updated: 10/14/2024
|
Latest Version: 1.126.59
Functions used to implement the Delegation Model with Tiers on the given Active Directory. |
By:
|
10 downloads
|
Last Updated: 10/14/2024
|
Latest Version: 0.34.2
Tasks and functions required by AD in order to maintain the environment clean and secured. Some of these tasks may include finding unused user objects or computers, creating semi-privileged accounts or monitoring privileged groups. |