kost / docker-securityLinks
Security oriented images for Docker
☆17Updated 10 years ago
Alternatives and similar repositories for docker-security
Users that are interested in docker-security are comparing it to the libraries listed below
Sorting:
- Dockerfiles for NSM tools☆84Updated 8 years ago
- Isolated, Scalable, & Lightweight Environment for Training☆111Updated 6 years ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago
- Db Database Assessment Tool☆212Updated 7 years ago
- SCAP content for Ubuntu to work with OpenSCAP☆49Updated 10 years ago
- Osquery Mangement Server☆115Updated 5 years ago
- Minion☆354Updated 6 years ago
- Mittn: Security test tool runner for test automation in CI☆197Updated 2 years ago
- Bro IDS programs collection.☆146Updated 6 years ago
- AWS risky security change detector based on EDDA.☆82Updated 7 years ago
- Enterprise Log Search and Archive☆211Updated 7 years ago
- Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS☆184Updated 3 years ago
- ☆49Updated 10 years ago
- SIAC is an enterprise SIEM built on open-source technology.☆115Updated 7 years ago
- ☆142Updated last year
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Collection of Auditd Examples and Presentations☆88Updated 5 years ago
- an osquery fleet manager☆620Updated 3 years ago
- Log aggregating, filtering, redirecting service☆60Updated 6 years ago
- Bro/Zeek integration with osquery☆94Updated 5 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆128Updated 10 years ago
- Grabs the administrator and authentication logs from the Duo Security API and sends CEF-formatted syslog.☆28Updated 9 years ago
- A Slack bot to add security info to messages containing URLs, hashes and IPs☆71Updated last year
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆141Updated 8 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Updated 10 months ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Updated 8 years ago
- Logstash configuration files for analyzing various types of logs☆25Updated 9 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆292Updated 2 years ago
- Scripts and integrations for OSSEC☆41Updated 9 years ago
- Bro-IDS scripts☆50Updated 9 years ago