draios / sysdig-workshop-forensics
☆17Updated 10 months ago
Alternatives and similar repositories for sysdig-workshop-forensics:
Users that are interested in sysdig-workshop-forensics are comparing it to the libraries listed below
- Sysdig labs☆13Updated last year
- ☆8Updated 7 years ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Updated 5 years ago
- Kernel assisted microcontainer packer☆24Updated 6 years ago
- ☆11Updated 7 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 6 years ago
- Logstash Configs used by Netflix☆31Updated 10 years ago
- ☆9Updated last year
- REST API test utility☆22Updated 5 years ago
- Enable Falco to read audit logs from EKS☆11Updated 4 years ago
- The Auditree data gathering and reporting tool.☆13Updated 7 months ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Updated 5 years ago
- Tool to collect system information to troubleshoot Cilium & Hubble related issues☆16Updated 3 years ago
- Opinionated CLI that standardizes and automates common development tasks☆11Updated 3 years ago
- Kubernetes Custom Metrics Adapter for Sysdig☆11Updated 3 years ago
- ☆33Updated 5 years ago
- ☆29Updated last month
- ☆12Updated 5 years ago
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆11Updated 9 years ago
- ☆14Updated 7 years ago
- ☆10Updated 5 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- Common libseccomp container code written in Go☆14Updated 4 years ago
- ir2proxy is a tool to convert Contour's IngressRoute resources to HTTPProxy resources.☆12Updated 4 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Updated 7 years ago
- Aqua Enterprise scanner as a plug-in vulnerability scanner in the Harbor registry☆36Updated 5 months ago