• Stars
    star
    1
  • Language
    HTML
  • Created almost 3 years ago
  • Updated almost 3 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Using Kubearmor runtime security shield to tackle log4j vulnerability

More Repositories

1

ebpf-guide

Ebpf faqs, samples, tooling
C
42
star
2

linux-kernel-configs

Linux kernel configs for popular distros.
Shell
27
star
3

wisecow

Shell
6
star
4

CookerWhistleCounter

Counts pressure-cooker whistles
Java
5
star
5

ngtcp2-helper

Provides interface, design details of ngtcp2. Future, will provide easy to use ngtcp2 APIs pre-integrated with various events/ssl libs.
3
star
6

yed-pallete

Assorted collection of yED icons/logos
3
star
7

dev-templates

Development Templates. Github pre-commit and other hooks.
Shell
2
star
8

sizeof

Sizeof contiki-ng, lwip2 network stacks
C
2
star
9

personaltools

HTML
2
star
10

src

Code snippets
Python
2
star
11

blockchain_blogs

My blockchain notes, slides, scripts, refs
Shell
2
star
12

env

My linux env setup: vimrc, bashrc, gitconfig, tmux.conf, screenrc. Installs vim-plugins and dependencies.
Vim Script
2
star
13

dummyLSM

Dummy Linux Security Module (for experimentation)
C
2
star
14

roll-root-ack

Enables RPL's storing MOP to ascertain e2e path establishment
Makefile
2
star
15

vagrants

Predefined Vagrantfiles for different images/scenarios
2
star
16

ut-tool

my basic unit-test tools based on minunit + ld_preload
C
1
star
17

abacus-train

Train kids for Abacus
Shell
1
star
18

rj-gists

gists, good-to-know commands, one-liners...
Shell
1
star
19

turnip

Test, Unfold, Reflect, Network IP addresses for its presence in the published blocklists.
Go
1
star
20

advgo

Go
1
star
21

thinkingcap

Problem Statements
1
star
22

katacoda-scenarios

Katacoda Scenarios
1
star
23

IETF_nbr_cache_mgmt

The repository maintains ID versions for the draft "Neighbor Management Policy for multihop 6lo networks". Submitted to IETF LWIG WG.
1
star
24

ietf-data

Performance data taken in context to IETF drafts
Shell
1
star
25

ES-D2D

C
1
star
26

k8sthreatmodeling

Threat Modeling (based on STRIDE approach) for Kubernetes systems.
HTML
1
star
27

security-rules-stash

Common rules stash for compliance authoring framework and also defence rules considering attack frameworks (such as MITRE).
XSLT
1
star