perlogix / cmonLinks
NIST Information Security Continuous Monitoring (ISCM) and configuration baseline data collector
☆16Updated 2 years ago
Alternatives and similar repositories for cmon
Users that are interested in cmon are comparing it to the libraries listed below
Sorting:
- Enable Falco to read audit logs from EKS☆11Updated 4 years ago
- automatic enumeration and maintenance of Suricata monitoring interfaces☆11Updated 5 years ago
- Now you won't miss the moment the domain expires.☆28Updated this week
- Mozilla scribe host policy evaluator☆14Updated 2 years ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- ☆33Updated 5 years ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 5 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- BeyondCorp-style federated access proxy☆49Updated last year
- Dynamic Outbound Firewall Authorizer☆22Updated 3 years ago
- Identity-Aware Proxy☆21Updated 2 years ago
- efficient linux security monitoring☆26Updated 6 years ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- Sysdig labs☆13Updated 2 years ago
- Syslog to Kafka gateway☆12Updated 7 years ago
- ☆11Updated 7 years ago
- ☆29Updated 4 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 6 months ago
- Find binary files not installed through package manager☆11Updated last year
- SNI respecting TLS reverse proxy that supports pluggable authentication☆16Updated last year
- INTERCEPT / Policy as Code Auditing & Compliance☆84Updated last month
- BlackDuck GItHub Action☆9Updated 2 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- Mozilla's take on duo_openvpn☆9Updated 2 months ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- Red team tool that emulates the SolarWinds CI compromise attack vector.☆24Updated last year
- rulebases for normalization with liblognorm☆12Updated 9 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- Home of code related to security of network systems.☆25Updated 5 months ago
- egrets monitors egress☆46Updated 5 years ago