sysflow-telemetry / sysflowLinks
SysFlow documentation and issues tracker
☆46Updated 8 months ago
Alternatives and similar repositories for sysflow
Users that are interested in sysflow are comparing it to the libraries listed below
Sorting:
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆43Updated 4 years ago
- Red Canary's eBPF Sensor☆107Updated 2 weeks ago
- Osquery Resources☆60Updated 5 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- SysFlow collection probe☆16Updated 4 months ago
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated 2 weeks ago
- Kubernetes offensive framework built in eBPF☆37Updated 2 years ago
- A repository to store Rad Fingerprinting data.☆24Updated 10 months ago
- Linux Kernel Runtime Integrity with eBPF☆177Updated last year
- Cisco Orbital - Osquery queries by Talos☆131Updated 9 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆70Updated 2 weeks ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- egrets monitors egress☆46Updated 5 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆70Updated 2 years ago
- SysFlow edge processing pipeline☆16Updated 4 months ago
- Falco rule repository☆125Updated this week
- simple YARA-based IOC scanner☆169Updated 3 months ago
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- ☆34Updated 3 years ago
- Kit for building Falco drivers: kernel modules or eBPF probes☆65Updated 2 weeks ago
- ptrace-based event producer for udig☆67Updated 2 years ago
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆315Updated 8 months ago
- Elastic's eBPF☆68Updated last month
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Firepit - STIX Columnar Storage☆16Updated 11 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆62Updated last month
- Expandable Defensive Cyber Operations Platform☆43Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆101Updated 2 years ago
- Stakeholder-Specific Vulnerability Categorization☆150Updated this week
- A Go implementation and parser for Sigma rules.☆89Updated 2 weeks ago