Tetragon is a component of Cilium that enables powerful real-time, eBPF-based Security Observability and Runtime Enforcement. It detects and reacts to security-significant events like Process execution, System call activity, and I/O activity including network & file access. Tetragon is Kubernetes-aware, understanding Kubernetes identities for individual workload security event detection.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
A brute-force protection middleware for express routes that rate-limits incoming requests.
A source code search engine for searching alphanumeric snippets, signatures, or keywords in web page HTML, JS, and CSS code.
Integrates static APK analysis with Yara and requires re-compilation of Yara with the androguard module.
Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.
A security-focused general purpose memory allocator providing the malloc API with hardening against heap corruption vulnerabilities.
ConDroid performs concolic execution of Android apps to observe 'interesting' behavior in dynamic analysis.
ThreatLocker is an enterprise cybersecurity platform that provides comprehensive endpoint protection and zero-trust security to prevent ransomware, viruses, and other malicious software from running on endpoints.
A Java API for searching and downloading Android applications from Google Play with additional check-in features for generating ANDROID-ID.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.