axoflow / axosyslogLinks
AxoSyslog - the scalable security data processor
☆93Updated last week
Alternatives and similar repositories for axosyslog
Users that are interested in axosyslog are comparing it to the libraries listed below
Sorting:
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆102Updated 10 months ago
- Simple ethernet interface traffic monitor and reporting tool☆88Updated last week
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆82Updated last week
- Add a layer of active defense to your cloud applications.☆95Updated 3 weeks ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆86Updated 3 weeks ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 10 months ago
- The Wazuh agent for endpoints.☆81Updated last month
- ☆74Updated 5 months ago
- ☆82Updated last month
- Deep Linux runtime visibility meets Wireshark☆292Updated last month
- Repo to hold wazuh manager mcp server☆52Updated last month
- ☆88Updated 3 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆109Updated 7 months ago
- DNS Shotgun: high-performance realistic DNS benchmarking tool. This is a mirrored repository.☆50Updated 2 weeks ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆55Updated last year
- Validate the isolation posture of your container environment.☆297Updated 2 weeks ago
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 8 months ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆18Updated last year
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated 7 months ago
- Kernel-based Process Monitoring on Linux Endpoints for File System, TCP and UDP Networking Events and optionally DNS, HTTP and SYSLOG App…☆67Updated 4 months ago
- Tool for obfuscating and deobfuscating data.☆72Updated last year
- ☆39Updated last month
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆71Updated 4 months ago
- Inspect certificate authorities in container images☆236Updated this week
- CrowdSec community kubernetes helm charts☆33Updated last month
- Monitoring a Kubernetes cluster involves deploying and utilizing the Wazuh agent within the Kubernetes environment.☆68Updated last week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 7 months ago
- ☆42Updated last year