falcosecurity / rules
Falco rule repository
☆112Updated 2 weeks ago
Alternatives and similar repositories for rules:
Users that are interested in rules are comparing it to the libraries listed below
- Falco plugins registry☆89Updated this week
- Generate a variety of suspect actions that are detected by Falco rulesets☆101Updated last week
- Runtime detection and response for malicious events in Kubernetes workloads☆43Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- Response Engine for managing threats in your Kubernetes☆151Updated this week
- Community curated list of System and Network policy templates for the KubeArmor and Cilium☆43Updated last month
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Kit for building Falco drivers: kernel modules or eBPF probes☆65Updated last week
- A simple WebUI with latest events from Falco☆119Updated last week
- Prometheus Metrics Exporter for Falco output events☆121Updated last week
- The Falco Project Community☆54Updated last month
- Runtime security plug to protect user containers☆65Updated last month
- ☆93Updated last month
- Administrative tooling for Falco☆96Updated this week
- Connect Falco to your ecosystem☆577Updated this week
- Create Kubernetes AdmissionReview requests from Kubernetes resource manifests☆115Updated last week
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆198Updated this week
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - for kind (and GKE, RKE2, AKS)☆35Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆80Updated 2 months ago
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆123Updated 2 weeks ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆343Updated this week
- A replacement for "kubectl exec" that works over WebSocket connections.☆36Updated 11 months ago
- Trivy's misconfiguration scanning engine☆217Updated 2 months ago
- ☆21Updated this week
- A tool for in-depth analysis of container checkpoints☆110Updated 2 weeks ago
- Use Trivy as a plug-in vulnerability scanner in the Harbor registry☆221Updated 6 months ago
- Community managed Helm charts for running Falco with Kubernetes☆255Updated this week
- Convert Falco logs to Docker seccomp profiles☆20Updated 8 years ago
- OCI hook to trace syscalls and generate a seccomp profile☆312Updated last week
- Kubernetes focused container assessment and context discovery tool for penetration testing☆452Updated 9 months ago