deepfence / pcap-tools
☆22Updated 4 years ago
Related projects: ⓘ
- ThreatMapper Terraform module for AWS☆24Updated last year
- Compliance Scripts Handler☆21Updated last month
- Deepfence Cloud Scanner runs in your cloud environment, gathering inventory and compliance information for the assets deployed in that en…☆33Updated last month
- Hyperscan bindings for Rust with Multiple Pattern and Streaming Scan☆21Updated last year
- Deepfence Cloud Scanner runs in your cloud environment, gathering inventory and compliance information for the assets deployed in that en…☆35Updated last month
- Deepfence Cloud Scanner runs in your cloud environment, gathering inventory and compliance information for the assets deployed in that en…☆35Updated this week
- High-performance regular expression matching library☆26Updated 11 months ago
- Front-end application for ALL the microservices☆23Updated 3 years ago
- CI/CD plugins for image scanning, integrations with AWS ECR, Google Container Registry☆32Updated last year
- ☆38Updated this week
- ☆41Updated last week
- Terraform/ Ansible configuraton to build a lab environment for trying out Deepfence Threatmapper.☆16Updated 4 years ago
- Deepfence Runtime API & code samples☆50Updated last year
- Vessel is the Go based utility that autodetects underlying Container Runtime in Kubernetes☆45Updated last week
- ⛴️Docker extension for deepfence/YaraHunter🔎☆24Updated last year
- ⛴️ Docker extension for deepfence/SecretScanner 🔐☆25Updated last year
- Kubernetes Security Posture Management☆14Updated 4 months ago
- An EBPF based IPv4/IPv6 firewall with integrations for OpenZiti Zero-Trust Framework edge-routers and tunnellers☆33Updated this week
- SysFlow documentation and issues tracker☆45Updated 3 months ago
- SysFlow collection probe☆15Updated last month
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆20Updated 5 months ago
- egrets monitors egress☆45Updated 4 years ago
- The Falco Project Community☆50Updated last week
- Checks whether a Windows server according to security best practices as defined in the CIS Distribution-Independent Windows Benchmark☆15Updated 4 months ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated 6 months ago
- Create machine images containing the Nessus vulnerability scanner☆10Updated last week
- Cryptography Bill of Materials☆51Updated this week
- Correlates serviceaccounts and pods to the permissions granted to them via rolebindings and clusterrolesbindings.☆34Updated 2 years ago
- ☆14Updated this week