A curated list of Deepfence's OSS related tools, frameworks and articles
- 💼 Official Projects
- 📂 Repositories
- 🗒️ Docs
- 📰 Blogs
- 📂 Repositories
- 🐾 Community Repositories
- 🗃️ Blogs and Articles
- 🐦 tweets
- 📹 Videos
- 📑 Slides
- 🎤 Podcasts
- 🧪 Interactive Learning
- 👫 Meetups & Events
- 🧰 IDE and Editor Integrations
- 📡 Support and Community
- Cloud Native Security with ThreatMapper
-
- ThreatMapper - 🔥 🔥 Open source cloud native security observability platform. Linux, K8s, AWS Fargate and more. 🔥 🔥
- SecretScanner - 🔓 🔓 Find secrets and passwords in container images and file systems 🔓 🔓
- PacketStreamer - ⭐ ⭐ Distributed tcpdump for cloud native environments ⭐ ⭐
- YaraHunter - 🔍🔍 Malware scanner for cloud-native, as part of CI/CD and at Runtime 🔍🔍
- FlowMeter - ⭐ ⭐ Use ML to classify flows and packets as benign or malicious. ⭐ ⭐
- ThreatMapper - 🔥 🔥 Open source cloud native security observability platform. Linux, K8s, AWS Fargate and more. 🔥 🔥
-
- Threatmapper Integrates Steampipe To Enhance Security Observability/
- Introducing the Shared Security Model For Cloud Native
- Aya : your tRusy eBPF companion
- Introducing to YaraRadare
- Network Traffic Observability : Three PacketStreamer User Cases
- Agent and Agentless : A Comprehensive Approach to Security
- Introducing PacketStreamer : Distributed Packet Capture for Cloud Native Platforms
- The Sisyphean task of Vulnerability Management
- How To Detect And Defeat The Log4j2 Vulnerability With Deepfence
- Visualize Attack Paths in Production Environments with Threatmapper
- CVE 2021 44228: Log4j2 Exploritablity & Attack Path mitigation with Threatmapper
- Threatmapper picks up where shift left ends
- Detecting Secrets To Reduce Attack Surface
- Runtime Threat Mapping For AWS- Fargate Serverless Deployments Using Deepfence/
- Observability And Security Of AWS Fargate Serverless Deployments
- Use Case Runtime Threat Mapping for Bottlerocket Containers Using Deepfence Threatmapper/
- Automating threat Mapping for Multicloud Environments
- Threat Mapping for Windows Containers
- Use Case - Runtime Threat Mapping for GKE using Deepfence Threatmapper
- Use Case - Runtime Threat Mapping for AKS using Deepfence Threatmapper
- Use Case - Runtime Threatmapping for Amazon ECS Using Deepfence Threatmapper
- Threatmapper Integrates Steampipe To Enhance Security Observability/
- write blog post, speak at meetups and events around deepfence projects and win Deepfence swag reach out to us @deepfence
- Threatmapper 1.3 Demo
- Log4j2 Vulnerability with Deepfence
- Equifax then, Log4j Now - reveal and seal off attack paths with Deepfence
- How to Install Threatmapper in Kubernetes
- Open Source Cloud Native Security with ThreatMapper
- Shift Left Security at Operations? How Do we make That work?
- 90 Sec intro to Threatmapper: How to find your most critical vulnerabilities
- What's new in Threatmapper 1.2
- Stop the Heist: How to D3FEND against ATT&CKS and Save the day
- Runtime security Observability for AWS Fargete
- Hardening Your CI/CD Pipleines with Gitops and Continuous Security
- Open Source Cloud Native Security with ThreatMapper - CNCF
- Finding vulnerabilities in production with open source ThreatMapper
- Deepfence on the kubernetes podcast by google
- Deepfence's Sandeep Lahane Featured On the Cloud Native Startup Podcast with Emily Omier
- secure the cloud
- evaluating exploitability of risk
- Shared Security Model
- eBPF technology and its use cases in security
- Cloud Native Application Protection Platforms -CNAPP
- alert fatigue
- Cyber Monday
- Security Observability
- Kubernetes IDE Lens
- VScode Extension
follow us on twitter,Linkedin& Youtube for more update Thanks for supporting us ! 😊