Filter By
Displaying results 1 - 13 of 13 (Page 1 of 1)
By:
|
6,906,389 downloads
|
Last Updated: 9/25/2024
|
Latest Version: 1.12.346
General Scripting Framework, providing PowerShell-specific infrastructure for other modules. |
By:
|
1,055,727 downloads
|
Last Updated: 11/11/2024
|
Latest Version: 1.40.0-B0147
Validate Azure resources and infrastructure as code using PSRule. This project uses GitHub Issues to track bugs and feature requests. See GitHub project for more information. |
By:
|
99,433 downloads
|
Last Updated: 9/28/2024
|
Latest Version: 0.0.90
Testimo is Powershell module that tests Active Directory against specific set of tests. |
By:
|
19,242 downloads
|
Last Updated: 5/29/2019
|
Latest Version: 1.2.1
A set of tools for executing validation of the operation of a system. It provides a way to organize and execute Pester tests which are written to validate operation (rather than limited feature tests) |
By:
|
1,188 downloads
|
Last Updated: 7/13/2018
|
Latest Version: 1.0
This module offers a set of tools to manage Cisco network devices. |
By:
|
1,005 downloads
|
Last Updated: 2/9/2017
|
Latest Version: 1.2.1
Infrastructure test runner using Pester |
By:
|
835 downloads
|
Last Updated: 8/27/2018
|
Latest Version: 1.1.1
This module offers a set of tools to manage IP networks and devices. |
By:
|
979 downloads
|
Last Updated: 7/25/2018
|
Latest Version: 1.0.1
This module offers a set of tools to manage Windows environment, such as servers and network services. |
By:
|
677 downloads
|
Last Updated: 12/18/2018
|
Latest Version: 1.1.0
Basic HTTP listener written in PowerShell that executes Operation Validation Framework (OVF) tests and returns results using a simple REST API |
By:
|
464 downloads
|
Last Updated: 10/14/2024
|
Latest Version: 1.126.59
Functions used to implement the Delegation Model with Tiers on the given Active Directory. |
By:
|
9 downloads
|
Last Updated: 10/14/2024
|
Latest Version: 0.34.2
Tasks and functions required by AD in order to maintain the environment clean and secured. Some of these tasks may include finding unused user objects or computers, creating semi-privileged accounts or monitoring privileged groups. |