eminaktas / threat-hunting-at-scale-demoLinks
Threat Hunting at Scale: Auditing Thousands of Clusters With Falco + Fluent
☆12Updated 3 years ago
Alternatives and similar repositories for threat-hunting-at-scale-demo
Users that are interested in threat-hunting-at-scale-demo are comparing it to the libraries listed below
Sorting:
- ☆21Updated 3 months ago
- Evolution process of The Falco Project☆54Updated this week
- Kubernetes Native, Runtime Container Image Scanning☆39Updated 3 years ago
- ☆88Updated 3 months ago
- ☆29Updated 7 months ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Updated last year
- Ansible role to setup Falco, behavioral security with sysdig☆42Updated 2 weeks ago
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆23Updated 8 months ago
- Slack alert bot for matching Github Audit Events☆10Updated 9 months ago
- This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures☆12Updated 2 years ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆106Updated 3 months ago
- Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specification☆68Updated this week
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Variety of kubectl krew tools usually security focused☆33Updated last month
- Vulnerability Scanner Suite based on grype and syft from anchore☆52Updated 3 years ago
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆60Updated 2 years ago
- Demos for several kubernetes security features☆63Updated 7 months ago
- Scans SBOMs for vulnerabilities with Grype☆85Updated last week
- docker image with useful network and container tools and SSH☆63Updated 9 months ago
- A Prometheus Exporter for managing vulnerabilities in kubernetes by using trivy☆26Updated 3 years ago
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆36Updated 7 months ago
- Falco plugins registry☆102Updated this week
- ☆82Updated last month
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 10 months ago
- List your tfsec issues in the QuickFix window with this plugin.☆12Updated 3 years ago
- Google Cloud Platform (GCP) configuration scanning tool☆16Updated 2 months ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆40Updated last year
- K8s API Honeypot with Active Defense Capabilities☆42Updated last year
- Run multiple-node, decentralized k3s clusters on Github action runners for test and development!☆10Updated 3 years ago