sshlog / agentLinks
SSH Session Monitoring Daemon
☆525Updated 2 years ago
Alternatives and similar repositories for agent
Users that are interested in agent are comparing it to the libraries listed below
Sorting:
- 🧰 Multi Tool Kubernetes Pentest Image☆251Updated 4 months ago
- HTOP for Elasticsearch☆291Updated last year
- Deep Linux runtime visibility meets Wireshark☆299Updated last month
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆176Updated 11 months ago
- A complete terminal user interface (TUI) for LDAP.☆853Updated 2 weeks ago
- A wrapper for integrating the OWASP Coraza WAF with HAProxy's SPOE filters.☆150Updated 2 weeks ago
- Passive DNS Capture and Monitoring Toolkit☆348Updated last week
- Open Source repository management for deb, rpm, and generic packages☆197Updated last year
- Linux Process Discovery. C Library, Go bindings, Runtime.☆223Updated 3 years ago
- AxoSyslog - the scalable security data processor☆100Updated this week
- Testing datasets and tools to compare WAF efficacy☆190Updated 9 months ago
- Validate the isolation posture of your container environment.☆309Updated 2 weeks ago
- Simple ethernet interface traffic monitor and reporting tool☆90Updated 3 weeks ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆194Updated 3 months ago
- A collection of nftables, multi routing scripts, port knocked, and iptables files. To get inspiration to make your own firewalls.☆93Updated 4 years ago
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆104Updated last year
- Kubernetes tool for scanning clusters for network policies and identifying unprotected workloads.☆450Updated last month
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- Linux Security and Monitoring Scripts☆327Updated 3 months ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆229Updated 6 months ago
- visualise your iptables chains☆719Updated 2 years ago
- Monitoring a Kubernetes cluster involves deploying and utilizing the Wazuh agent within the Kubernetes environment.☆71Updated last month
- TC, XDP, KProbe and CGroup eBPF based simple Ethernet interface traffic monitor and reporting tool☆128Updated 3 weeks ago
- Zaps arguments and environment from the process list☆238Updated last year
- Monitor Network Traffic Per Executable, Beautifully Visualized☆842Updated 2 years ago
- Grab your DNS logs, detect anomalies, and finally understand what's happening on your network. The missing piece between DNS servers and …☆329Updated this week
- Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.☆1,055Updated last month
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- Simple Wireguard 2FA☆677Updated last week
- Inspect certificate authorities in container images☆240Updated last month