nianticlabs / venatorLinks
A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalone or with other job schedulers like Nomad.
☆382Updated 10 months ago
Alternatives and similar repositories for venator
Users that are interested in venator are comparing it to the libraries listed below
Sorting:
- An opensource incident management platform integrating with Slack.☆549Updated 7 months ago
- select * from logs; Tailpipe is an open source SIEM for instant log insights, powered by DuckDB. Analyze millions of events in seconds, r…☆467Updated this week
- Kexa's simple rules (Open Source) make it easy to monitoring and manage alerting of your entire cloud. With various monitoring and alerti …☆287Updated this week
- Extract +700 technologies from any repository. Detect Languages, SaaS, Cloud, Infrastructure, Dependencies and Services☆316Updated last month
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆179Updated last year
- CI/CD Security Analyzer☆663Updated 5 months ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆36Updated last year
- A web fuzzer using the httpipe format☆101Updated last year
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆74Updated 3 months ago
- A multi-vault secret injection tool for safely injecting secrets into app environment☆127Updated last month
- A Software as a Service (SaaS) log collection framework.☆174Updated this week
- Kingfisher is a blazingly fast secret‑scanning and validation tool built in Rust☆461Updated this week
- RemoteLocal Environments to build distributed applications.☆159Updated this week
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.☆52Updated 10 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆252Updated this week
- Open-source best practices for protecting a secure, sensible cloud platform☆126Updated 9 months ago
- Security tool against dependency typosquatting attacks☆53Updated last week
- Validate the isolation posture of your container environment.☆294Updated last month
- Ruroco is a tool that lets you execute commands on a server by sending UDP packets. The commands are configured on the server side, so th…☆548Updated this week
- seCureLI is a tool that enables you to experience the delight of building products by helping you get ideas from your head into working s…☆28Updated last year
- ReARM - Supply Chain Security and Asset Management for Releases, SBOMs, xBOMs, Security Artifacts☆51Updated this week
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆152Updated 8 months ago
- Chalk allows you to follow code from development, through builds and into production.☆388Updated this week
- A curated list of tools, papers, and datasets for applying AI to cybersecurity tasks. This list primarily focuses on modern AI technologi…☆76Updated 3 weeks ago
- CLI that detects fake-star campaigns, dependency hijacks, licence red-flags and other signs of repository risk. Inspired by the “4.5 mill…☆400Updated last month
- ☆70Updated this week
- A command-line Ollama client for scripting.☆80Updated 5 months ago
- Web Server Vulnerability Scanning Tool☆36Updated 4 months ago
- Burrow is a globally distributed HTTP proxy via AWS Lambda☆241Updated 7 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆14Updated 4 months ago