Category: Defense

Supply-chain Levels

slsa v1.0 releases: Supply-chain Levels for Software Artifacts

SLSA: Supply-chain Levels for Software Artifacts Supply-chain Levels for Software Artifacts (SLSA, pronounced salsa) is an end-to-end framework for ensuring the integrity of software artifacts throughout the software supply chain. The requirements are inspired by...

Activity Monitor

kmon v1.6.4 releases: Linux Kernel Manager and Activity Monitor

kmon: Linux Kernel Manager and Activity Monitor The kernel is the part of the operating system that facilitates interactions between hardware and software components. On most systems, it is loaded on startup after the bootloader and handles I/O requests as well...

Cilium

cilium v1.14.1 releases: eBPF-based Networking, Security, and Observability

cilium: eBPF-based Networking, Security, and Observability Cilium is open source software for providing and transparently securing network connectivity and load-balancing between application workloads such as application containers or processes. Cilium operates at Layer 3/4...

clouditor

clouditor: supports continuous cloud assurance

clouditor Clouditor is a tool which supports continuous cloud assurance. Its main goal is to continuously evaluate if a cloud-based application (built using, e.g., Amazon Web Services (AWS) or Microsoft Azure) is configured in...

Bastion

the-bastion v3.14 releases: securely connect to devices

The Bastion Bastions are a cluster of machines used as the unique entry point by operational teams (such as sysadmins, developers, database admins, …) to securely connect to devices (servers, virtual machines, cloud instances,...

HoneyCreds

HoneyCreds: detect responder and other network poisoners

HoneyCreds HoneyCreds network credential injection to detect responder and other network prisoners.   Install git clone https://github.com/Ben0xA/HoneyCreds.git cd HoneyCreds pip3 install -r requirements.txt Settings It is advised that you change these settings to best...

hunting in Microsoft 365 Defender

gundog: guided hunting for Microsoft 365 Defender

gundog gundog – PowerShell based guided hunting in Microsoft 365 Defender Gundog provides you with guided hunting in Microsoft 365 Defender. Especially (if not only) for Email and Endpoint Alerts at the moment. Functionality...

application security platform

Curiefense v1.5 releases: new application security platform

curiefense Curiefense is a new application security platform, which protects sites, services, and APIs. It extends Envoy proxy to defend against a variety of threats, including SQL and command injection, cross-site scripting (XSS), account...