CrowdStrike / ivan
Falcon Image Vulnerability Analysis (IVAN) is a command-line image assessment tool.
☆16Updated 6 months ago
Alternatives and similar repositories for ivan:
Users that are interested in ivan are comparing it to the libraries listed below
- A collection of projects supporting AWS Integration☆153Updated this week
- CrowdStrike Container Image Scan Github Action☆16Updated 5 months ago
- Helm Charts for running CrowdStrike Falcon with Kubernetes☆82Updated last week
- Cloud deployment size calculation utilities☆18Updated last week
- List of vendors that do not allow IMDSv2 enforcement☆141Updated 10 months ago
- ☆96Updated last year
- Create custom auto-remediation solutions using serverless functions in the cloud.☆53Updated last year
- Code to scan a container with CrowdStrike and return response codes indicating pass/fail status.☆37Updated last month
- Terraform PrismaCloud provider☆55Updated this week
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆71Updated this week
- Prisma Cloud docs☆79Updated 11 months ago
- ☆44Updated 10 months ago
- ☆37Updated 4 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- Postman collections for Prisma Cloud☆76Updated 7 months ago
- ☆19Updated this week
- ☆115Updated last week
- SCP management tool☆131Updated last year
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆96Updated 3 years ago
- Discover for Cloud and Containers Azure☆29Updated 2 months ago
- Grand Central logging for Cloud Services to Splunk☆36Updated 3 years ago
- Terraform provider for Prisma Cloud Compute☆25Updated last week
- Prisma Cloud API tools for convenience and general utility.☆18Updated 4 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆147Updated last month
- https://breaches.cloud☆38Updated 5 months ago
- Public REPO for splunkbase app☆19Updated 3 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- ☆51Updated last week
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆55Updated 3 months ago
- Cross cloud workload identity research and workshops☆36Updated last week