Falco Rules is a repository containing officially managed detection rules by The Falco Project for identifying security threats, abnormal behaviors, and compliance violations. The repository provides pre-defined detection rules that monitor syscalls and container events to identify suspicious activities in runtime environments. Users can leverage community-contributed rules or develop custom detection logic tailored to their specific security requirements. The rules focus on runtime security monitoring, enabling detection of various threat patterns including unauthorized access attempts, privilege escalation, and anomalous system behavior. The repository supports modification and customization of existing rules to adapt to different environments and security policies. Documentation includes a Rules Overview Document and regular release notes that provide updates on new threat patterns and system compatibility. The project maintains an active development cycle with contributions from the security community to address evolving threats and system changes.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Open-source security automation platform for automating security alerts and building AI-assisted workflows.
Automated Digital Forensics and Incident Response (DFIR) software for rapid incident response and intrusion investigations.
Shuffle Automation provides an open-source platform for security orchestration, automation, and response.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
RedEye is a visual analytic tool that provides enhanced situational awareness and operational insights for both Red and Blue Team cybersecurity operations.
RedELK is a SIEM tool designed for red teams to monitor and receive alerts about blue team detection activities during penetration testing engagements.
Fast Intercept is a security automation platform that empowers users to maximize their existing security products and automate routine tasks.
IRIS-SOAR is a Python-based modular SOAR platform that automates security incident response workflows and integrates with DFIR-IRIS for enhanced digital forensics operations.
A community repository of workflow templates for the Ayehu NG platform that enables automated IT and business process execution.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.