dkorunic / pktstat
Simple ethernet interface traffic monitor and reporting tool
☆80Updated this week
Alternatives and similar repositories for pktstat:
Users that are interested in pktstat are comparing it to the libraries listed below
- Add a layer of active defense to your cloud applications.☆89Updated last week
- Tool for obfuscating and deobfuscating data.☆67Updated 11 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆64Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆79Updated last month
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆36Updated last year
- ☆71Updated 11 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆84Updated 11 months ago
- Modular web-application honeypot platform built using go and gin☆55Updated 9 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆165Updated 8 months ago
- Automation tool for Windows Deception Host Burn-In☆82Updated 2 months ago
- cloudgrep is grep for cloud storage☆324Updated 2 weeks ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear and Zendesk☆53Updated last month
- Deep Linux runtime visibility meets Wireshark☆268Updated 2 weeks ago
- OWASP Top 10 Infrastructure Security Risks☆29Updated last month
- AWS honey token manager☆87Updated 6 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆82Updated last week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated last month
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆215Updated 2 weeks ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆77Updated 3 weeks ago
- ☆15Updated 7 months ago
- Validate the isolation posture of your container environment.☆245Updated this week
- AxoSyslog - the scalable security data processor☆71Updated this week
- Service that scans your Infrastructure as Code for common vulnerabilities☆47Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆52Updated 3 weeks ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 8 months ago
- ☆111Updated last month