perlogix / cmonLinks
NIST Information Security Continuous Monitoring (ISCM) and configuration baseline data collector
☆16Updated 2 years ago
Alternatives and similar repositories for cmon
Users that are interested in cmon are comparing it to the libraries listed below
Sorting:
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 7 months ago
- ☆11Updated 7 years ago
- Mozilla scribe host policy evaluator☆14Updated 2 years ago
- Aqua Enterprise scanner as a plug-in vulnerability scanner in the Harbor registry☆37Updated 9 months ago
- Enable Falco to read audit logs from EKS☆11Updated 4 years ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- Identity-Aware Proxy☆21Updated 2 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- BlackDuck GItHub Action☆9Updated 2 years ago
- Understand OVAL results in a blink of an eye☆35Updated 3 years ago
- automatic enumeration and maintenance of Suricata monitoring interfaces☆11Updated 5 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- Sysdig labs☆13Updated 2 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- efficient linux security monitoring☆26Updated 7 years ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 6 years ago
- ☆29Updated 5 months ago
- The Container Security Book—a free book for practitioners☆83Updated 5 years ago
- BeyondCorp-style federated access proxy☆49Updated last year
- Network visualizer tool built using Processing☆24Updated 4 years ago
- Syslog to Kafka gateway☆12Updated 7 years ago
- ☆33Updated 6 years ago
- Parse Suricata rules☆13Updated last year
- Container Snitch checks running processes under the Docker Engine and alerts if any are found to be running as root☆78Updated 7 years ago
- Alcide Kubernetes Audit Log Analyzer - Alcide kAudit☆36Updated 4 years ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Updated 5 years ago
- A low/zero interaction ssh authentication logging honeypot☆22Updated 11 months ago
- egrets monitors egress☆46Updated 5 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago