axoflow / axosyslog
AxoSyslog - the scalable security data processor
☆82Updated this week
Alternatives and similar repositories for axosyslog:
Users that are interested in axosyslog are comparing it to the libraries listed below
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆55Updated this week
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆102Updated 6 months ago
- Automation tool for Windows Deception Host Burn-In☆85Updated 4 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆21Updated 6 months ago
- Contextal Platform, a powerful, open-source cybersecurity solution designed for contextual threat detection and intelligence.☆27Updated last month
- ☆72Updated 3 months ago
- Simple ethernet interface traffic monitor and reporting tool☆82Updated 3 weeks ago
- An implementation of a Windows Event Collector server running on GNU/Linux.☆70Updated this week
- Converts Netwitness log parser configuration to Logstash configuration☆20Updated 4 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 3 months ago
- ☆42Updated last year
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆65Updated last week
- DNS Shotgun: high-performance realistic DNS benchmarking tool. This is a mirrored repository.☆48Updated 2 months ago
- KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and files…☆38Updated 6 months ago
- ☆73Updated last month
- Pomerium Kubernetes Ingress Controller☆27Updated this week
- ☆86Updated last month
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆46Updated 11 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆54Updated last year
- A multi-tenancy focused solution, that facilitates collection of telemetry data from Kubernetes workloads transparently.☆42Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆82Updated 3 months ago
- Monitoring a Kubernetes cluster involves deploying and utilizing the Wazuh agent within the Kubernetes environment.☆59Updated this week
- Security Alert Decoration☆27Updated this week
- Tools for Wazuh by Juan C. Tello☆14Updated 3 years ago
- Kexa's simple rules (Open Source) make it easy to monitoring and manage alerting of your entire cloud. With various monitoring and alerti…☆110Updated this week
- ☆17Updated 3 years ago
- *Unofficial* Helm chart for TheHive☆16Updated 2 years ago
- Kubernetes policy enforcement using python☆28Updated 3 weeks ago
- Official documentation for TheHive Project applications☆21Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 6 months ago