paulveillard / cybersecurity-pamLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
☆28Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pam
Users that are interested in cybersecurity-pam are comparing it to the libraries listed below
Sorting:
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆24Updated 3 years ago
- Security Monitoring using Wazuh, published by Packt☆23Updated last year
- T-Guard Repository☆16Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- CyHy Dashboard☆17Updated this week
- Add a layer of active defense to your cloud applications.☆92Updated this week
- DefectDojo Community Content☆18Updated 2 weeks ago
- ☆73Updated 3 months ago
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆18Updated last month
- A generic skeleton project for quickly getting a new cisagov project started.☆18Updated 3 weeks ago
- NIST OSCAL SDK and CLI☆19Updated last week
- OWASP Foundation Web Respository☆54Updated 3 weeks ago
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆280Updated this week
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 5 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆12Updated 7 months ago
- Open source incident management and response platform.☆12Updated 7 years ago
- The OWASP SAMM Website☆11Updated last week
- Oxomium is a cybersecurity gouvernance and conformity (GRC) tool for CISCO and SECOPS. By linking framework control, audit findings and m…☆14Updated 5 months ago
- FedRAMP Requests For Comments (RFCs)☆18Updated this week
- Checks whether a Windows server according to security best practices as defined in the CIS Distribution-Independent Windows Benchmark☆20Updated 2 months ago
- CLI tool to generate terraform files from existing ZPA and ZIA☆18Updated this week
- Wazuh Agent as Docker Image☆24Updated last year
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆32Updated last year
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆18Updated 10 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆77Updated last week
- ☆52Updated 3 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆10Updated 4 years ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆48Updated last year
- The vulnerability management guide should help to breakdown vulnerability management process into a manageable repeatable cycles tailored…☆16Updated 4 years ago
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆102Updated 8 months ago