secmon-lab / alertchain
Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego
☆23Updated this week
Alternatives and similar repositories for alertchain:
Users that are interested in alertchain are comparing it to the libraries listed below
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆47Updated last year
- Trivy based vulnerability management service☆55Updated last month
- Kubernetes CTF☆43Updated 4 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆46Updated 2 years ago
- General GitHub event notification tool to Slack with Open Policy Agent and Rego☆21Updated 3 weeks ago
- Kilt is a project that defines how to inject foreign apps into containers☆13Updated last year
- GCP Secret Management Demo Tool☆13Updated 6 years ago
- RPM DB bindings for go☆62Updated last week
- Scalable security network sensor as low interaction honeypot☆16Updated last year
- Decentralized Cyber Threat Intelligence Kaizen Framework☆26Updated 3 years ago
- Tracing security events in container with BPF☆15Updated last year
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆20Updated this week
- The Dirty Pipe Vulnerability☆46Updated 3 years ago
- RISKEN is a monitoring tool for visualizing security risks.☆21Updated 3 weeks ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- Zero trust proxy for using in corporate☆71Updated 3 months ago
- Waffle is a library that provides in-app WAF (Web Application Firewall) and RASP (Runtime Application Self Protection) capabilities for y…☆16Updated last week
- silence negligible CVE alerts using LLM☆42Updated this week
- Go AST based static analysis tool with Rego☆61Updated last year
- The tutorial of "Kubernetes Security for Microservices"☆14Updated last year
- Validate "terraform plan" changes against a customizable ruleset☆29Updated 6 months ago
- Examples to demonstrate how to use PipeCD☆32Updated this week
- trivy-db-to is a tool for migrating/converting vulnerability information from Trivy DB to other datasource.☆27Updated 6 months ago
- Identity Aware Proxy☆20Updated 3 years ago
- Save temporary security credentials of AWS via Azure AD SSO☆25Updated 9 months ago
- VulsRepo is visualized based on the json report output in vuls.☆35Updated 3 years ago
- itacho to manage and operate envoy based service mesh.☆28Updated last year
- grpcstub provides gRPC server and client conn ( *grpc.ClientConn ) for stubbing, for testing in Go.☆12Updated last week
- A Go library for parsing and verifying versions and version constraints.☆44Updated this week
- CVEs <--> Metasploit-Framework modules☆24Updated this week