Romana automates the creation of isolated cloud native networks and secures applications with a distributed firewall that applies access control policies consistently across all endpoints (pods or VMs) and services, wherever they run. Through Romana's topology aware IPAM, endpoints receive natively routable addresses: No overlays or tunnels are required, increasing performance and providing operational simplicity. Because IP addresses are assigned with network topology in mind, routes within the network are highly aggregated, reducing the impact on networking hardware, and allowing more secure configurations. Supports Kubernetes and OpenStack clusters, on premise or on AWS.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A low interaction Python honeypot designed to mimic various services and ports to attract attackers and log access attempts.
A WebSocket Manipulation Proxy with a user interface to capture, intercept, and send custom messages for WebSocket and Socket.IO communications.
Fail2ban is a daemon that automatically bans IP addresses showing malicious behavior by monitoring log files and updating firewall rules to prevent brute-force attacks.
CrowdSec is a behavior detection engine with a global IP reputation network.
A python tool for discovering endpoints, parameters, and wordlists in a given target
LinkLiar is a status menu app for spoofing MAC addresses to enhance privacy on MacBook.
A network recon framework including tools for passive and active recon
Firewall, Blackhole, and Privatizing Proxy for macOS with comprehensive security features.
Snort 3 is the next generation Snort IPS with enhanced features and improved cross-platform support.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.