Cilium Logo

Cilium

0
Free
Visit Website

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. It provides a simple flat Layer 3 network with the ability to span multiple clusters in either a native routing or overlay mode. It is L7-protocol aware and can enforce network policies on L3-L7 using an identity based security model that is decoupled from network addressing. Cilium implements distributed load balancing for traffic between pods and to external services, and is able to fully replace kube-proxy, using efficient hash tables in eBPF allowing for almost unlimited scale. It also supports advanced functionality like integrated ingress and egress gateway, bandwidth management and service mesh, and provides deep network and security visibility and monitoring. A new Linux kernel technology called eBPF is at the foundation of Cilium. It supports dynamic insertion of eBPF bytecode into the Linux kernel at various integration points such as: network IO, application sockets, and tracepoints to implement security, networking and visibility logic. eBPF is highly efficient and flexible. To learn more about eBPF, visit eBPF.io. Stable Releases The Cilium community maintains minor stable releases.

FEATURES

ALTERNATIVES

A powerful command-line packet analyzer and a portable C/C++ library for network traffic capture with comprehensive documentation.

A Yara scanner for IMAP feeds and saved streams, extracting attachments and scanning them with chosen Yara rule files.

Passively maps and visually displays ICS/SCADA network topology for network security

Passive sniffer tool for analyzing traffic patterns.

A command-line tool for managing and analyzing Microsoft Forefront TMG and UAG configurations.

A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.

A simple CORS misconfiguration scanner

Accurate detection of HTTPS interception and robust TLS fingerprinting tool.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved