paulveillard / cybersecurity-pam
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
☆28Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pam:
Users that are interested in cybersecurity-pam are comparing it to the libraries listed below
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆23Updated 3 years ago
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆17Updated last month
- Security Monitoring using Wazuh, published by Packt☆20Updated last year
- Automation tool for Windows Deception Host Burn-In☆85Updated 5 months ago
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆71Updated this week
- CyHy Dashboard☆15Updated this week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆65Updated 2 weeks ago
- Add a layer of active defense to your cloud applications.☆92Updated last week
- DefectDojo Community Content☆18Updated 6 months ago
- ☆10Updated 4 months ago
- Wazuh Agent as Docker Image☆23Updated 11 months ago
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 4 months ago
- ☆73Updated last month
- Automated CIS Benchmark Compliance Remediation for Postgresql-12.x with Ansible☆12Updated last year
- Scripts to deploy and update MISP in air-gapped environments☆17Updated last month
- Checks whether a Windows server according to security best practices as defined in the CIS Distribution-Independent Windows Benchmark☆21Updated last month
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆9Updated 4 years ago
- The Wazuh agent for endpoints.☆68Updated this week
- ☆32Updated 5 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆37Updated 3 months ago
- Manage, monitor and improve your cyber security posture.☆91Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated 10 months ago
- Open source incident management and response platform.☆12Updated 7 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆18Updated 3 months ago
- The Vanta Control Set maps common compliance standards from their requirements to controls and provides them in an easy to consume machin…☆9Updated 3 years ago
- ☆51Updated 3 years ago
- OCSF Schema WEB Server☆50Updated 2 weeks ago
- The Auditree framework tool to run compliance control checks as unit tests.☆64Updated 8 months ago
- ☆23Updated last month
- OWASP Foundation Web Respository☆50Updated 2 weeks ago