jaredjennings / helm-thehiveLinks
*Unofficial* Helm chart for TheHive
☆16Updated 2 years ago
Alternatives and similar repositories for helm-thehive
Users that are interested in helm-thehive are comparing it to the libraries listed below
Sorting:
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆77Updated this week
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆233Updated this week
- A deliberately vulnerable Kubernetes cluster☆127Updated last year
- Wazuh - Wazuh Kubernetes☆323Updated this week
- OWASP Kubernetes Security Testing Guide☆38Updated 11 months ago
- Ansible role to setup Falco, behavioral security with sysdig☆42Updated last month
- Response Engine for managing threats in your Kubernetes☆168Updated this week
- An open source, cloud-native security to protect everything from build to runtime☆308Updated last week
- ☆229Updated 3 months ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆52Updated last year
- Inspect certificate authorities in container images☆236Updated last week
- Osquery Resources☆61Updated 5 years ago
- Dynamic Application and API Security Testing☆192Updated 2 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 9 months ago
- A collection of tools to improve your containerized apps security posture☆144Updated last year
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆248Updated 3 weeks ago
- Repository for Cribl Helm Charts☆46Updated last week
- open source, cloud-native, graph-based asset inventory☆360Updated this week
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆166Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆189Updated 11 months ago
- Notice: Postee is no longer under active development or maintenance.☆210Updated 2 months ago
- Flowpipe sample mods, demonstrating common pipeline patterns and how to use the Flowpipe library mods. Run directly or use as examples fo…☆19Updated 9 months ago
- The security workflow engine!☆119Updated this week
- Kubernetes audit logging, when you don't control the control plane☆84Updated this week
- Wazuh - Puppet module☆49Updated this week
- Helm Charts for running CrowdStrike Falcon with Kubernetes☆89Updated last week
- Terraform Provider for Splunk☆109Updated last month
- Kubernetes Common Configuration Scoring System☆123Updated 3 years ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆387Updated last year
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, wor…☆476Updated 3 years ago