humio / cliLinks
CLI Client for Humio - Stream Logs All Day Long
☆48Updated 4 months ago
Alternatives and similar repositories for cli
Users that are interested in cli are comparing it to the libraries listed below
Sorting:
- CLI tool for CIDR range operations (check, generate)☆138Updated 5 years ago
- Shell wrapper to run a login shell with `sudo` as the current user for the purpose of audit logging☆95Updated 3 years ago
- The command-line client for Journal☆13Updated last year
- mmguero's miscellaneous Dockerfiles, docker-compose.yml files, related scripts and configuration.☆17Updated 3 weeks ago
- from http://www.pc-tools.net/unix/grepcidr/☆90Updated 8 years ago
- Automated testing, generation & manipulation of #osquery packs☆73Updated last year
- ☆54Updated 3 years ago
- A Security Results Viewer for the web with storage, teams and history☆35Updated 2 years ago
- Cross-platform provider for Summon that talks to keyrings.☆15Updated 2 years ago
- docker image with useful network and container tools and SSH☆68Updated 11 months ago
- Improves Ubuntu security feed compatibility allowing it to be consumed by Debian vulnerability report tool, debsecan.☆12Updated 4 years ago
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- A library and a tool for converting audit logs to XML and JSON☆46Updated 7 years ago
- python humio adapter☆28Updated last year
- Golang-based SDK to CrowdStrike's APIs☆75Updated this week
- I can keep a SSHecret☆71Updated last year
- Get TOTP from the command line using TOTP secrets in Sops encrypted files.☆41Updated last month
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆36Updated 2 years ago
- Cinc Gitlab mirror - Repository with patches and omnibus builders for inspec☆32Updated this week
- Compromised/Pwned Passwords API On-premisses☆25Updated 2 years ago
- A web application to streamline the development of STIGs from SRGs☆80Updated last week
- VMware vCenter Text UI☆37Updated 5 years ago
- A command-line and ruby API of utilities, converters and tools for creating, converting and processing security baseline formats, results…☆94Updated last year
- Copy a Docker image between registries without a full Docker installation☆37Updated 7 years ago
- 𐄳 Ansible role to install Tailscale. Zero config VPN. Installs on any device in minutes, manages firewall rules for you, and works from …☆20Updated 2 years ago
- Certonid is a Serverless SSH Certificate Authority☆77Updated last month
- ☆90Updated 5 months ago
- Cyberark secrets provider for k8s☆28Updated last month
- A powerful shell script tool for managing multiple SSH tunnels concurrently.☆12Updated 2 years ago
- Traffic and attack generation between simulated microservices.☆35Updated 4 years ago