axoflow / axosyslogLinks
AxoSyslog - the scalable security data processor
☆95Updated this week
Alternatives and similar repositories for axosyslog
Users that are interested in axosyslog are comparing it to the libraries listed below
Sorting:
- Simple ethernet interface traffic monitor and reporting tool☆89Updated this week
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆102Updated 11 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆91Updated 2 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 11 months ago
- Add a layer of active defense to your cloud applications.☆95Updated last week
- ☆75Updated 6 months ago
- DNS Shotgun: high-performance realistic DNS benchmarking tool. This is a mirrored repository.☆50Updated 2 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 10 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆110Updated 9 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Updated 3 years ago
- Repo to hold wazuh manager mcp server☆59Updated 2 weeks ago
- ☆89Updated 4 months ago
- ☆84Updated 3 months ago
- SSH Session Monitoring Daemon☆523Updated 2 years ago
- Inspect certificate authorities in container images☆237Updated last week
- Red Teaming for AI and Cloud☆197Updated 4 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 9 months ago
- Validate the isolation posture of your container environment.☆300Updated last month
- Monitoring a Kubernetes cluster involves deploying and utilizing the Wazuh agent within the Kubernetes environment.☆71Updated last week
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆73Updated 5 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Updated last year
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆87Updated this week
- Deep Linux runtime visibility meets Wireshark☆293Updated 2 months ago
- The Wazuh agent for endpoints.☆85Updated 3 months ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆36Updated last year
- ☆94Updated last week
- Tools for Wazuh by Juan C. Tello☆15Updated 3 years ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆227Updated 3 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 9 months ago