paulveillard / cybersecurity-pamLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
☆28Updated 3 years ago
Alternatives and similar repositories for cybersecurity-pam
Users that are interested in cybersecurity-pam are comparing it to the libraries listed below
Sorting:
- The Wazuh agent for endpoints.☆86Updated 4 months ago
- AxoSyslog - the scalable security data processor☆98Updated this week
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆91Updated this week
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆366Updated this week
- T-Guard Repository☆17Updated last year
- Add a layer of active defense to your cloud applications.☆99Updated last week
- OWASP Foundation Web Respository☆63Updated last month
- Wazuh Agent as Docker Image☆24Updated last year
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆103Updated last year
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆25Updated 3 years ago
- Aranya user library, daemon, and policy code☆190Updated last week
- Docker helper files for running eramba software☆61Updated 2 months ago
- The Auditree framework tool to run compliance control checks as unit tests.☆72Updated last year
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- 🤖 Admyral enables continuous control monitoring for any custom control☆334Updated last year
- (Unofficial) Wazuh integration to send alerts to IRIS.☆20Updated 10 months ago
- Useful templates and working document for implementing ISO 27001 - ISMS☆192Updated 7 months ago
- Wazuh dashboard, the Wazuh UI platform☆57Updated this week
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated last year
- DefectDojo Community Content☆18Updated 3 weeks ago
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆148Updated 3 months ago
- CLI tool to generate terraform files from existing ZPA and ZIA☆22Updated this week
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆112Updated 5 years ago
- Open source incident management and response platform.☆13Updated 7 years ago
- VulnRisk - Open Source Vulnerability Risk Assessment Platform☆86Updated last week
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆167Updated last year
- Fully automated host & network intrusion detection platform. Detects malware from behavioural patterns rather than signatures and enables…☆138Updated last year
- A modern, all-in-one Governance, Risk & Compliance (GRC) solution designed for privacy, security, and compliance teams. As an open-source…☆63Updated last week
- Tool for generating a report from results of oscap scan.☆24Updated last year
- ☆75Updated 8 months ago