Curating Falco rules with MITRE ATT&CK Matrix
☆87Mar 7, 2024Updated 2 years ago
Alternatives and similar repositories for falco_extended_rules
Users that are interested in falco_extended_rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆75May 3, 2024Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Falco rule repository☆164Updated this week
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- 🧰 Multi Tool Kubernetes Pentest Image☆257Mar 30, 2026Updated 2 weeks ago
- CLI audit tool for GitHub organization with OPA/Rego☆12Mar 20, 2026Updated 3 weeks ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- ☆117Feb 11, 2026Updated 2 months ago
- Hackthebox automation scripts and writeups.☆22Jan 27, 2020Updated 6 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Labs for Threat Modelling training delivered by ControlPlane☆35Mar 25, 2026Updated 3 weeks ago
- ☆24Aug 8, 2025Updated 8 months ago
- Security Blueprint for Startups☆39Mar 17, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Detect intrusions that happened in your Kubernetes cluster through audit logs using Falco☆63Jun 2, 2021Updated 4 years ago
- suidsnoop is a tool based on eBPF LSM programs that logs whenever a suid binary is executed and implements custom allow/deny lists.☆16Oct 31, 2021Updated 4 years ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆118Feb 12, 2026Updated 2 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- Secrets scanner that understands code☆168Dec 3, 2025Updated 4 months ago
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆13Jun 25, 2020Updated 5 years ago
- 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team b…☆10May 8, 2023Updated 2 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,439Jan 20, 2026Updated 2 months ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Tool for building Kubernetes attack paths☆958Apr 8, 2026Updated last week
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆176Mar 2, 2026Updated last month
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- ☆14Jan 8, 2026Updated 3 months ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆182Oct 9, 2025Updated 6 months ago
- Webhook service for Kubernetes LDAP authentication with the Webhook Token authentication plugin☆10Jun 17, 2020Updated 5 years ago
- This project demonstrates the use of eBPF (Extended Berkeley Packet Filter) to trace file deletion events on a Linux system. A Go userspa…☆13Oct 11, 2024Updated last year
- ☆11Sep 14, 2020Updated 5 years ago
- Scan your account for the use of untrusted AMIs☆32Apr 6, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- ☆12Jun 15, 2023Updated 2 years ago
- Runtime detection and response for malicious events in Kubernetes workloads☆46Mar 14, 2024Updated 2 years ago
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 11 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Feb 16, 2025Updated last year
- Keep track of changes in website with WEBSY☆35May 22, 2023Updated 2 years ago
- A terraform module to create a VPC with secure default configurations.☆17Jan 18, 2022Updated 4 years ago