axoflow / axosyslog
AxoSyslog - the scalable security data processor
☆83Updated this week
Alternatives and similar repositories for axosyslog
Users that are interested in axosyslog are comparing it to the libraries listed below
Sorting:
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆102Updated 7 months ago
- DNS Shotgun: high-performance realistic DNS benchmarking tool. This is a mirrored repository.☆48Updated last week
- An implementation of a Windows Event Collector server running on GNU/Linux.☆71Updated 2 weeks ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆46Updated 11 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆68Updated this week
- ☆42Updated last year
- KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and files…☆39Updated 7 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 4 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆21Updated 7 months ago
- K8s-Secret-Expiry-Controller is a Kubernetes operator that manages and tracks the lifespan of Kubernetes secrets.☆14Updated last year
- Monitoring a Kubernetes cluster involves deploying and utilizing the Wazuh agent within the Kubernetes environment.☆59Updated last week
- Converts Netwitness log parser configuration to Logstash configuration☆20Updated 4 years ago
- Google Cloud Platform (GCP) configuration scanning tool☆16Updated last month
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆54Updated last year
- Simple ethernet interface traffic monitor and reporting tool☆83Updated last month
- Automation tool for Windows Deception Host Burn-In☆86Updated 5 months ago
- ☆72Updated this week
- AppArmor and Seccomp profiles for Docker images☆13Updated 5 months ago
- pySigma backend for generating Grafana Loki/LogQL rules☆45Updated 2 weeks ago
- Deep Linux runtime visibility meets Wireshark☆290Updated this week
- The Wazuh agent for endpoints.☆69Updated this week
- ☆16Updated 10 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 7 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆67Updated last month
- Simple root privilege escalation detection using eBPF 🐝☆12Updated 3 months ago
- ☆86Updated 2 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 8 months ago
- Kubernetes audit logging, when you don't control the control plane☆77Updated last week
- Helping VMware users migrate to alternative Hypervisors☆67Updated this week
- Tool for obfuscating and deobfuscating data.☆70Updated last year