axoflow / axosyslogLinks
AxoSyslog - the scalable security data processor
☆85Updated last week
Alternatives and similar repositories for axosyslog
Users that are interested in axosyslog are comparing it to the libraries listed below
Sorting:
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆102Updated 7 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆71Updated 3 weeks ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 4 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆21Updated 7 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- An implementation of a Windows Event Collector server running on GNU/Linux.☆72Updated last month
- Deep Linux runtime visibility meets Wireshark☆291Updated 3 weeks ago
- Converts Netwitness log parser configuration to Logstash configuration☆20Updated 4 years ago
- Simple ethernet interface traffic monitor and reporting tool☆84Updated 2 months ago
- Simple root privilege escalation detection using eBPF 🐝☆12Updated 4 months ago
- DNS Shotgun: high-performance realistic DNS benchmarking tool. This is a mirrored repository.☆50Updated 3 weeks ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆36Updated last year
- ☆72Updated 3 weeks ago
- Scripts to deploy and update MISP in air-gapped environments☆17Updated 2 months ago
- ☆42Updated last year
- Source code and examples for Antignis☆43Updated 2 years ago
- Monitoring a Kubernetes cluster involves deploying and utilizing the Wazuh agent within the Kubernetes environment.☆61Updated this week
- eBPF-Based NFS Telemetry Exporter for Kubernetes☆37Updated 11 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated 11 months ago
- ☆63Updated 2 years ago
- KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and files…☆39Updated 7 months ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆98Updated 5 months ago
- Kernel-based Process Monitoring on Linux Endpoints for File System, TCP and UDP Networking Events and optionally DNS, HTTP and SYSLOG App…☆64Updated last month
- k8s-installer - One-click k8s single-node cluster installation on your own device.☆69Updated last year
- ☆73Updated 2 months ago
- Ansible role to setup Falco, behavioral security with sysdig☆41Updated 3 weeks ago
- Open source endpoint agent providing host information to Zeek. [v2]☆82Updated this week
- K8s-Secret-Expiry-Controller is a Kubernetes operator that manages and tracks the lifespan of Kubernetes secrets.☆14Updated last year
- ☆48Updated this week