sysflow-telemetry / sysflowLinks
SysFlow documentation and issues tracker
☆45Updated last year
Alternatives and similar repositories for sysflow
Users that are interested in sysflow are comparing it to the libraries listed below
Sorting:
- Red Canary's eBPF Sensor☆111Updated 4 months ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆110Updated 4 months ago
- A repository to store Rad Fingerprinting data.☆24Updated last year
- Linux Kernel Runtime Integrity with eBPF☆183Updated last year
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- A repository for OSSEC rules and decoders☆53Updated 2 years ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆44Updated 5 years ago
- Falco rule repository☆140Updated this week
- Understand OVAL results in a blink of an eye☆35Updated 3 years ago
- Suricata Verification Tests - Testing Suricata Output☆115Updated this week
- Elastic's eBPF☆69Updated last month
- Kit for building Falco drivers: kernel modules or eBPF probes☆67Updated this week
- Tools for conducting analysis of CVE data in Elasticsearch☆73Updated 3 months ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆150Updated 3 years ago
- ptrace-based event producer for udig☆67Updated 3 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated last week
- Osquery Resources☆62Updated 6 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆57Updated 10 months ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- Falco plugins registry☆104Updated last week
- Links and resources for the O'Reilly Kubernetes Security book☆99Updated 4 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆86Updated last month
- K8s API Honeypot with Active Defense Capabilities☆42Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆87Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆95Updated 8 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆73Updated 2 years ago
- ☆186Updated last week
- Zeek IDS Dockerfile☆101Updated 2 years ago
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆187Updated last year
- Expandable Defensive Cyber Operations Platform☆43Updated 3 years ago