kost / docker-securityLinks
Security oriented images for Docker
☆17Updated 10 years ago
Alternatives and similar repositories for docker-security
Users that are interested in docker-security are comparing it to the libraries listed below
Sorting:
- Dockerfiles for NSM tools☆84Updated 8 years ago
- Isolated, Scalable, & Lightweight Environment for Training☆111Updated 6 years ago
- Docker container for MISP☆96Updated 7 years ago
- Db Database Assessment Tool☆212Updated 7 years ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago
- an osquery fleet manager☆619Updated 3 years ago
- SIAC is an enterprise SIEM built on open-source technology.☆116Updated 7 years ago
- ☆142Updated last year
- [DEPRECATED] A quickstart demo for Kolide tools☆52Updated 7 years ago
- Grabs the administrator and authentication logs from the Duo Security API and sends CEF-formatted syslog.☆28Updated 9 years ago
- Bro/Zeek integration with osquery☆94Updated 5 years ago
- A Slack bot to add security info to messages containing URLs, hashes and IPs☆71Updated last year
- Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS☆184Updated 3 years ago
- Scripts and integrations for OSSEC☆41Updated 9 years ago
- Bro IDS programs collection.☆146Updated 6 years ago
- AWS risky security change detector based on EDDA.☆82Updated 7 years ago
- SPL to lucene translator☆15Updated 10 years ago
- Minion☆355Updated 6 years ago
- SCAP content for Ubuntu to work with OpenSCAP☆49Updated 10 years ago
- A docker based honeypot.☆151Updated 10 years ago
- Honeypot Intelligence with Splunk☆255Updated 7 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆127Updated 10 years ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Updated 6 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Updated 2 months ago
- CVE feed synchronization to issue management system☆58Updated 10 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆154Updated last year
- (OBSOLETE) Plugins for Bro☆53Updated 8 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 5 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago