paulveillard / cybersecurity-pam
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
☆26Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pam:
Users that are interested in cybersecurity-pam are comparing it to the libraries listed below
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆23Updated 3 years ago
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆15Updated this week
- Contextal Platform, a powerful, open-source cybersecurity solution designed for contextual threat detection and intelligence.☆27Updated last week
- Automation tool for Windows Deception Host Burn-In☆83Updated 3 months ago
- ☆72Updated last week
- DefectDojo Community Content☆17Updated 5 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆9Updated 4 years ago
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆79Updated last week
- Manage, monitor and improve your cyber security posture.☆89Updated last year
- Scripts to deploy and update MISP in air-gapped environments☆17Updated 2 weeks ago
- CyHy Dashboard☆11Updated this week
- Open source incident management and response platform.☆12Updated 7 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆15Updated last month
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆30Updated 9 months ago
- Security Monitoring using Wazuh, published by Packt☆18Updated 11 months ago
- ☆32Updated 4 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 2 months ago
- T-Guard Repository☆13Updated 10 months ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆16Updated 7 months ago
- ☆16Updated 3 years ago
- ☆19Updated 3 years ago
- Ansible Playbooks for Security Onion Deployment to VMware ESXi☆12Updated 2 years ago
- NIST OSCAL SDK and CLI☆18Updated 8 months ago
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- ☆10Updated 3 months ago
- The Wazuh agent for endpoints.☆58Updated this week
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆17Updated 7 months ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆52Updated 2 years ago
- ☆50Updated 3 years ago