01Automated security scanning via AWS SSM and GCP APIs
02Runtime process monitoring for cryptominers and reverse shells
03File integrity monitoring (FIM) for critical system files
04Network connection auditing for Command & Control (C2) callbacks
05Resource utilization anomaly detection to identify CPU spikes
060 GitHub stars