sysflow-telemetry / sysflow
SysFlow documentation and issues tracker
☆46Updated 5 months ago
Alternatives and similar repositories for sysflow:
Users that are interested in sysflow are comparing it to the libraries listed below
- Red Canary's eBPF Sensor☆101Updated 7 months ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆42Updated 4 years ago
- A repository to store Rad Fingerprinting data.☆23Updated 7 months ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆68Updated 9 months ago
- Osquery Resources☆60Updated 5 years ago
- SysFlow edge processing pipeline☆15Updated last month
- ptrace-based event producer for udig☆67Updated 2 years ago
- egrets monitors egress☆46Updated 4 years ago
- Falco rule repository☆112Updated last week
- Linux Kernel Runtime Integrity with eBPF☆172Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆144Updated 3 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆68Updated last month
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated 8 months ago
- Kubernetes offensive framework built in eBPF☆37Updated last year
- Falco plugins registry☆87Updated this week
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 3 weeks ago
- Zeek IDS Dockerfile☆100Updated 2 years ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆101Updated this week
- SysFlow collection probe☆16Updated last month
- SysFlow project APIs☆15Updated 8 months ago
- Stakeholder-Specific Vulnerability Categorization☆137Updated this week
- Kit for building Falco drivers: kernel modules or eBPF probes☆65Updated this week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆62Updated 2 weeks ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆54Updated this week
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 4 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Cloud Native Security Hub - Security Resources☆54Updated 4 years ago
- Cisco Orbital - Osquery queries by Talos☆130Updated 6 months ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 7 months ago