axoflow / axosyslogLinks
AxoSyslog - the scalable security data processor
☆100Updated this week
Alternatives and similar repositories for axosyslog
Users that are interested in axosyslog are comparing it to the libraries listed below
Sorting:
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆104Updated last year
- Simple ethernet interface traffic monitor and reporting tool☆90Updated 3 weeks ago
- Repo to hold wazuh manager mcp server☆69Updated 3 months ago
- Add a layer of active defense to your cloud applications.☆101Updated 2 weeks ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆99Updated 4 months ago
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆97Updated last week
- ☆43Updated last week
- Deep Linux runtime visibility meets Wireshark☆299Updated last month
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆54Updated 2 months ago
- Validate the isolation posture of your container environment.☆309Updated last week
- DNS Shotgun: high-performance realistic DNS benchmarking tool. This is a mirrored repository.☆50Updated last month
- ☆85Updated 2 months ago
- The Wazuh agent for endpoints.☆93Updated 5 months ago
- VulnRisk - Open Source Vulnerability Risk Assessment Platform☆121Updated last month
- SSH Session Monitoring Daemon☆525Updated 2 years ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- CrowdSec community kubernetes helm charts☆39Updated 2 weeks ago
- ☆75Updated 9 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Updated 2 years ago
- ☆55Updated 3 years ago
- Inspect certificate authorities in container images☆240Updated 3 weeks ago
- ☆93Updated last month
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆229Updated 5 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆187Updated last week
- K8s-Secret-Expiry-Controller is a Kubernetes operator that manages and tracks the lifespan of Kubernetes secrets.☆15Updated 2 years ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆176Updated 11 months ago
- ☆22Updated 3 years ago