axoflow / axosyslogLinks
AxoSyslog - the scalable security data processor
☆102Updated this week
Alternatives and similar repositories for axosyslog
Users that are interested in axosyslog are comparing it to the libraries listed below
Sorting:
- Simple ethernet interface traffic monitor and reporting tool☆90Updated last month
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆104Updated last year
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆100Updated 2 weeks ago
- Repo to hold wazuh manager mcp server☆71Updated 3 months ago
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆102Updated this week
- Add a layer of active defense to your cloud applications.☆102Updated this week
- Gixy-Next: NGINX Configuration Security Scanner & Performance Checker☆113Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆110Updated last year
- The Wazuh agent for endpoints.☆94Updated 6 months ago
- Deep Linux runtime visibility meets Wireshark☆300Updated 2 months ago
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆55Updated 2 months ago
- ☆75Updated 10 months ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆232Updated 6 months ago
- ☆86Updated last week
- DNS Shotgun: high-performance realistic DNS benchmarking tool. This is a mirrored repository.☆50Updated 2 months ago
- Microsoft Defender for Cloud threat matrix for Kubernetes☆30Updated 2 years ago
- ☆93Updated 2 months ago
- ☆43Updated last week
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- SSH Session Monitoring Daemon☆524Updated 2 years ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆176Updated 11 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆74Updated 9 months ago
- Validate the isolation posture of your container environment.☆311Updated 3 weeks ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Updated 2 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- Kernel-based Process Monitoring on Linux Endpoints for File System, TCP and UDP Networking Events and optionally DNS, HTTP and SYSLOG App…☆70Updated 9 months ago
- Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data lo…☆32Updated 4 months ago