nianticlabs / venator
A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalone or with other job schedulers like Nomad.
☆373Updated 5 months ago
Alternatives and similar repositories for venator:
Users that are interested in venator are comparing it to the libraries listed below
- An opensource incident management platform integrating with Slack.☆536Updated 2 months ago
- Burrow is a globally distributed HTTP proxy via AWS Lambda☆238Updated 2 months ago
- Extract 500+ technologies from any repository. Detect Languages, SaaS, Cloud, Infrastructure, Dependencies and Services☆267Updated last year
- Ruroco is a tool that lets you execute commands on a server by sending UDP packets. The commands are configured on the server side, so th…☆537Updated this week
- Validate the isolation posture of your container environment.☆247Updated this week
- a web fuzzer using the httpipe format☆100Updated 11 months ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆179Updated 7 months ago
- The Noisy Sockets CLI☆258Updated 5 months ago
- RemoteLocal Environments to build distributed applications.☆158Updated 3 months ago
- Deploy and manage confidential containers on Kubernetes☆224Updated this week
- Discover and enumerate all subdomains associated with a website, including those not publicly advertised. Use this tool to conduct thorou…☆120Updated 4 months ago
- A Software as a Service (SaaS) log collection framework.☆148Updated last week
- Kronotop is a Redis-compatible, distributed and transactional document database backed by FoundationDB.☆246Updated this week
- ☆255Updated 3 months ago
- Making on-call suck less for engineers☆694Updated 4 months ago
- Gitops for non-Kubernetes folks☆419Updated 6 months ago
- TideCloak lets your users hold their own digital authority—no central control, no blind trust.☆62Updated 3 weeks ago
- A multi-vault secret injection tool for safely injecting secrets into app environment☆116Updated last month
- dead mans switch without reliance on your system☆297Updated last week
- Find API quality and security issues via your OpenAPI spec☆234Updated 3 weeks ago
- Open-source best practices for protecting a secure, sensible cloud platform☆121Updated 4 months ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆36Updated last year
- Embedded storage built for multiplexing. Smart machines don't need to read JSON, they only need protocol buffers. The world's first MODMS…☆290Updated 2 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆146Updated 3 months ago
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.☆52Updated 5 months ago
- Gram is Klarna's own threat model diagramming tool☆319Updated this week
- CI/CD Security Analyzer☆652Updated this week
- cloudgrep is grep for cloud storage☆324Updated this week