Curating Falco rules with MITRE ATT&CK Matrix
☆88Mar 7, 2024Updated 2 years ago
Alternatives and similar repositories for falco_extended_rules
Users that are interested in falco_extended_rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆76May 3, 2024Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆117Feb 11, 2026Updated last month
- AWS Quick Start Team☆16Oct 3, 2024Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Labs for Threat Modelling training delivered by ControlPlane☆35Updated this week
- ☆24Aug 8, 2025Updated 7 months ago
- Security Blueprint for Startups☆39Mar 17, 2020Updated 6 years ago
- Detect intrusions that happened in your Kubernetes cluster through audit logs using Falco☆63Jun 2, 2021Updated 4 years ago
- A Python package which wanders across your AWS account and records your resources in a variety of Storage Connectors☆23Jan 11, 2022Updated 4 years ago
- ☆21May 8, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Generate a variety of suspect actions that are detected by Falco rulesets☆117Feb 12, 2026Updated last month
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- ☆25Oct 14, 2024Updated last year
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆13Jun 25, 2020Updated 5 years ago
- 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team b…☆10May 8, 2023Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 4 months ago
- Tool for building Kubernetes attack paths☆951Updated this week
- Command-line tool for rendering bar charts that can be displayed directly in the terminal or in text-based files like Markdown.☆19Jul 7, 2024Updated last year
- A kubectl plugin for viewing decoded Secret data with search flags.☆40Oct 10, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆183Oct 9, 2025Updated 5 months ago
- Webhook service for Kubernetes LDAP authentication with the Webhook Token authentication plugin☆10Jun 17, 2020Updated 5 years ago
- Kubernetes Security Training Platform - focusing on security mitigation☆981Sep 2, 2024Updated last year
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- Scan your account for the use of untrusted AMIs☆32Mar 16, 2026Updated last week
- ☆11Sep 14, 2020Updated 5 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- ☆13Jun 15, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Secure and performant OCI-image builder for Kubernetes☆12Mar 19, 2026Updated last week
- Runtime detection and response for malicious events in Kubernetes workloads☆46Mar 14, 2024Updated 2 years ago
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 11 years ago
- Bhadra is a Vulnerability Management Platform to handle all security issues☆16Mar 2, 2026Updated 3 weeks ago
- React-Flo is a React based visual node graph editor☆12May 24, 2018Updated 7 years ago
- Convenience repo for providing access to various presentations.☆12Mar 4, 2026Updated 3 weeks ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year