perlogix / cmon
NIST Information Security Continuous Monitoring (ISCM) and configuration baseline data collector
☆16Updated last year
Related projects: ⓘ
- Mozilla scribe host policy evaluator☆13Updated last year
- Enable Falco to read audit logs from EKS☆11Updated 3 years ago
- efficient linux security monitoring☆25Updated 6 years ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆34Updated 2 years ago
- Darkbit Cloud Security Tools☆25Updated 3 years ago
- ☆33Updated 5 years ago
- Sysdig labs☆13Updated last year
- ☆11Updated 6 years ago
- Identity-Aware Proxy☆21Updated last year
- certgrep is a cross-platform command line tool that extracts SSL certificates from either a network interface or a local PCAP file.☆17Updated 2 years ago
- ☆13Updated this week
- BeyondCorp-style federated access proxy☆48Updated last year
- Find binary files not installed through package manager☆11Updated last year
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 4 months ago
- Reconnaissance test in Kubernetes clusters☆21Updated 5 years ago
- Dynamic Outbound Firewall Authorizer☆21Updated 2 years ago
- Kubernetes security scanner based on the open-source container vulnerability scanner Trivy.☆23Updated 3 years ago
- Kernel assisted microcontainer packer☆24Updated 5 years ago
- osquery input plugin☆10Updated 5 years ago
- SNI respecting TLS reverse proxy that supports pluggable authentication☆15Updated 10 months ago
- Now you won't miss the moment the domain expires.☆27Updated this week
- Auditing & Hardening script for Kubernetes☆45Updated 6 years ago
- Tool providing easy IAM setup on EKS for Amazon Managed Service for Prometheus (AMP) users.☆11Updated 11 months ago
- ☆29Updated 3 years ago
- ☆17Updated 4 months ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Updated 6 years ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 5 years ago
- Mozilla's take on duo_openvpn☆8Updated 3 months ago
- Home of code related to security of network systems.☆23Updated 10 months ago
- Aqua Enterprise scanner as a plug-in vulnerability scanner in the Harbor registry☆34Updated this week