axoflow / axosyslogLinks
AxoSyslog - the scalable security data processor
☆102Updated last week
Alternatives and similar repositories for axosyslog
Users that are interested in axosyslog are comparing it to the libraries listed below
Sorting:
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆104Updated last year
- Simple ethernet interface traffic monitor and reporting tool☆92Updated last week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆101Updated last month
- Repo to hold wazuh manager mcp server☆74Updated 4 months ago
- Add a layer of active defense to your cloud applications.☆103Updated this week
- DNS Shotgun: high-performance realistic DNS benchmarking tool. This is a mirrored repository.☆50Updated 2 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- ☆86Updated last week
- Validate the isolation posture of your container environment.☆311Updated last month
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Updated 2 years ago
- The Wazuh agent for endpoints.☆94Updated 7 months ago
- ☆75Updated 10 months ago
- Deep Linux runtime visibility meets Wireshark☆302Updated 3 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆56Updated 3 months ago
- Monitoring a Kubernetes cluster involves deploying and utilizing the Wazuh agent within the Kubernetes environment.☆73Updated 2 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data lo…☆32Updated 5 months ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆22Updated last year
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- Inspect certificate authorities in container images☆240Updated 2 months ago
- Tools for Wazuh by Juan C. Tello☆15Updated 4 years ago
- ☆22Updated 3 years ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆74Updated 9 months ago
- Gixy-Next: NGINX Configuration Security Scanner & Performance Checker☆137Updated 3 weeks ago
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆95Updated this week
- ☆42Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Updated 2 years ago
- ☆93Updated 3 months ago
- Microsoft Defender for Cloud threat matrix for Kubernetes☆30Updated 3 years ago