sysflow-telemetry / sysflowLinks
SysFlow documentation and issues tracker
☆46Updated last year
Alternatives and similar repositories for sysflow
Users that are interested in sysflow are comparing it to the libraries listed below
Sorting:
- Red Canary's eBPF Sensor☆112Updated 6 months ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆44Updated 5 years ago
- A repository to store Rad Fingerprinting data.☆24Updated last year
- Falco rule repository☆147Updated 2 weeks ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆113Updated 6 months ago
- Kit for building Falco drivers: kernel modules or eBPF probes☆67Updated 3 weeks ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆83Updated last week
- Tools for conducting analysis of CVE data in Elasticsearch☆73Updated 4 months ago
- A repository for OSSEC rules and decoders☆54Updated 2 years ago
- Understand OVAL results in a blink of an eye☆35Updated 3 years ago
- Suricata Verification Tests - Testing Suricata Output☆117Updated this week
- Open source endpoint agent providing host information to Zeek. [v2]☆90Updated 2 weeks ago
- Kubernetes offensive framework built in eBPF☆39Updated 2 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆73Updated 2 years ago
- Linux Kernel Runtime Integrity with eBPF☆183Updated 2 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 7 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆100Updated 4 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated last year
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Updated 7 months ago
- ☆103Updated 3 weeks ago
- egrets monitors egress☆46Updated 5 years ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 10 months ago
- K8s API Honeypot with Active Defense Capabilities☆44Updated last year
- ☆188Updated last week
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- bpflock - eBPF driven security for locking and auditing Linux machines☆150Updated 3 years ago
- Build a local copy of MITRE ATT&CK and CAPEC. Server mode for easy querying.☆33Updated 2 weeks ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆57Updated last year
- Osquery Resources☆63Updated 6 years ago