nianticlabs / venator
A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalone or with other job schedulers like Nomad.
☆375Updated 7 months ago
Alternatives and similar repositories for venator
Users that are interested in venator are comparing it to the libraries listed below
Sorting:
- An opensource incident management platform integrating with Slack.☆545Updated 4 months ago
- select * from logs; Tailpipe is an open source SIEM for instant log insights, powered by DuckDB. Analyze millions of events in seconds, r…☆420Updated this week
- Extract 550+ technologies from any repository. Detect Languages, SaaS, Cloud, Infrastructure, Dependencies and Services☆280Updated this week
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Updated 10 months ago
- Kexa's simple rules (Open Source) make it easy to monitoring and manage alerting of your entire cloud. With various monitoring and alerti…☆276Updated this week
- A Software as a Service (SaaS) log collection framework.☆168Updated 2 weeks ago
- Validate the isolation posture of your container environment.☆277Updated this week
- Ruroco is a tool that lets you execute commands on a server by sending UDP packets. The commands are configured on the server side, so th…☆540Updated last week
- Burrow is a globally distributed HTTP proxy via AWS Lambda☆242Updated 4 months ago
- Software Distribution Platform - Distr is the easiest way to distribute enterprise software to customer-controlled or shared-responsibili…☆528Updated this week
- a web fuzzer using the httpipe format☆101Updated last year
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆180Updated this week
- Gram is Klarna's own threat model diagramming tool☆320Updated 2 weeks ago
- The Noisy Sockets CLI☆261Updated 7 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆149Updated 5 months ago
- RemoteLocal Environments to build distributed applications.☆159Updated last month
- Making on-call suck less for engineers☆711Updated 6 months ago
- boostsecurityio/poutine☆267Updated this week
- cloudgrep is grep for cloud storage☆327Updated 2 months ago
- A curated list of tools, papers, and datasets for applying AI to cybersecurity tasks. This list primarily focuses on modern AI technologi…☆57Updated last week
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.☆52Updated 7 months ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆564Updated last week
- Generate datasets of cloud audit logs for common attacks☆214Updated 9 months ago
- CI/CD Security Analyzer☆658Updated 2 months ago
- A standard for reducing log volume without sacrificing analytical capability☆204Updated 2 months ago
- Entropy is a CLI tool that will scan your codebase for high entropy lines, which are often secrets.☆706Updated last month
- ☆109Updated 8 months ago
- Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating pr…☆459Updated this week
- Open-source best practices for protecting a secure, sensible cloud platform☆125Updated 6 months ago
- A multi-vault secret injection tool for safely injecting secrets into app environment☆124Updated 3 weeks ago