ancat / egretsLinks
egrets monitors egress
☆46Updated 5 years ago
Alternatives and similar repositories for egrets
Users that are interested in egrets are comparing it to the libraries listed below
Sorting:
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated last month
- Kubernetes Unhinged Shell 😎☆46Updated 2 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆105Updated 6 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆29Updated 6 months ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- ☆27Updated 3 weeks ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆52Updated 2 weeks ago
- ☆89Updated last year
- K8s API Honeypot with Active Defense Capabilities☆42Updated last year
- Modron - Cloud security compliance☆34Updated 9 months ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- ☆13Updated 7 months ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- Visualize your Terraform files☆34Updated 5 years ago
- Hosted analyzers built for Grapl☆14Updated 2 years ago
- Pattern recognition for hosts, services, and content☆13Updated 3 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆16Updated 6 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- AWS EKS Cluster Forensics☆23Updated 4 years ago
- ebpfpub is a generic function tracing library for Linux that supports tracepoints, kprobes and uprobes.☆117Updated 2 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated 2 months ago
- A repository to store Rad Fingerprinting data.☆24Updated last year
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆35Updated 3 years ago
- ☆82Updated 2 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- ☆28Updated 5 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago