perlogix / cmon
NIST Information Security Continuous Monitoring (ISCM) and configuration baseline data collector
☆16Updated last year
Alternatives and similar repositories for cmon:
Users that are interested in cmon are comparing it to the libraries listed below
- Mozilla scribe host policy evaluator☆14Updated last year
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- ☆33Updated 5 years ago
- efficient linux security monitoring☆26Updated 6 years ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- Sysdig labs☆13Updated last year
- Identity-Aware Proxy☆21Updated 2 years ago
- certgrep is a cross-platform command line tool that extracts SSL certificates from either a network interface or a local PCAP file.☆17Updated 3 years ago
- BeyondCorp-style federated access proxy☆48Updated last year
- Syslog to Kafka gateway☆12Updated 6 years ago
- Dynamic Outbound Firewall Authorizer☆22Updated 2 years ago
- Enable Falco to read audit logs from EKS☆11Updated 4 years ago
- ☆11Updated 6 years ago
- ☆17Updated 10 months ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Updated 7 years ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated last week
- ☆29Updated last month
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Mozilla's take on duo_openvpn☆9Updated 2 months ago
- Aqua Enterprise scanner as a plug-in vulnerability scanner in the Harbor registry☆36Updated 4 months ago
- The Auditree data gathering and reporting tool.☆13Updated 6 months ago
- Certificate Utility for AWS(ACM, IAM, ALB, CLB, CloudFront)☆17Updated 7 years ago
- automatic enumeration and maintenance of Suricata monitoring interfaces☆11Updated 5 years ago
- Scripts for deploying DAP followers to Kubernetes and OpenShift given an existing DAP master cluster☆14Updated 4 months ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Updated 4 years ago
- ☆8Updated 6 years ago
- Find binary files not installed through package manager☆11Updated last year
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Synchronize AWS credential profiles from remote sources☆12Updated 2 weeks ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 5 years ago