Serverless

Explore 28 curated cybersecurity tools, with 15,161 visitors searching for solutions

Alibaba Cloud Realtime Compute for Apache Flink Logo

Managed Apache Flink service for real-time stream & batch data processing

0
Alibaba Cloud ApsaraDB RDS for MySQL Logo

Cloud-based managed MySQL database service with automated operations

0
Wallarm API Security Logo

Unified API and AI security platform for discovery, protection, and testing

0
Sysdig Container and Kubernetes Security Logo

Container and Kubernetes security platform with runtime visibility and detection

0
Sysdig Cloud Detection & Response (CDR) Logo

Real-time cloud threat detection, investigation, and response platform

0
BitLyft AIR® Logo

Automated incident response platform for Microsoft 365 and identity systems

0
Infoblox NIOS-X as a Service Logo

Cloud-based DDI (DNS, DHCP, IPAM) service for hybrid multi-cloud environments

0
Aqua Security Runtime Protection Logo

Runtime protection for containers, K8s, serverless, and VMs in cloud environments

0
Aqua Security Serverless Functions Logo

Security platform for serverless functions with vulnerability scanning & runtime

0
Trend Micro File Security Logo

Malware scanning for cloud object storage and file services

0
Palo Alto Networks Prisma Cloud Logo

Code to cloud security platform for app lifecycle protection

0
SentinelOne Singularity Cloud Security Logo

Comprehensive CNAPP solution with CSPM, CWPP, CDR, CIEM, and DevSecOps capabilities

0
Varna Logo

Varna is an AWS serverless security tool that monitors CloudTrail logs using Event Query Language to detect and alert on suspicious activities in cloud environments.

0
SyntheticSun Logo

A defense-in-depth security automation framework for AWS that combines threat intelligence, machine learning, and serverless technologies to prevent, detect, and respond to threats through automated security telemetry collection and analysis.

0
AWS Lambda - IAM Access Key Disabler Logo

A Lambda function that automatically disables AWS IAM User Access Keys after a specified time period to reduce security risks from aging credentials.

0
Serverless Trap Honeyλ Logo

A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.

0
Datadog Logo

Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.

0
LambdaGuard Logo

LambdaGuard is an AWS Lambda auditing tool that provides security configuration checks, statistical analysis, and service dependency mapping for serverless functions.

0
MadKing Amazon Web Services Attack Platform Logo

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

0
BinaryAlert Logo

BinaryAlert is an open-source serverless AWS pipeline that automatically scans files uploaded to S3 buckets with YARA rules and generates immediate alerts when malware is detected.

0
OWASP ServerlessGoat Logo

A serverless application that demonstrates common serverless security flaws and weaknesses

0
Lambda-Proxy Logo

Lambda-Proxy is a utility that enables SQL injection testing of AWS Lambda functions by converting SQLMap HTTP attacks into Lambda invoke calls through a local proxy.

0
Substation Logo

A cloud-native, event-driven data pipeline toolkit for security teams that processes and routes data across AWS services with custom formatting and API enrichment capabilities.

0
AzureC2Relay Logo

An Azure Function that validates and relays Cobalt Strike beacon traffic based on Malleable C2 profile authentication.

0