paulveillard / cybersecurity-pam
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
☆27Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pam:
Users that are interested in cybersecurity-pam are comparing it to the libraries listed below
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆23Updated 3 years ago
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆16Updated 2 weeks ago
- ☆73Updated 3 weeks ago
- Security Monitoring using Wazuh, published by Packt☆19Updated last year
- Automation tool for Windows Deception Host Burn-In☆85Updated 4 months ago
- Manage, monitor and improve your cyber security posture.☆90Updated last year
- ☆32Updated 4 months ago
- T-Guard Repository☆13Updated 11 months ago
- Open source incident management and response platform.☆12Updated 7 years ago
- Contextal Platform, a powerful, open-source cybersecurity solution designed for contextual threat detection and intelligence.☆27Updated 3 weeks ago
- Tool for generating a report from results of oscap scan.☆20Updated 6 months ago
- Scripts to deploy and update MISP in air-gapped environments☆17Updated last month
- Wazuh Agent as Docker Image☆23Updated 11 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆17Updated 2 months ago
- Checks whether a Windows server according to security best practices as defined in the CIS Distribution-Independent Windows Benchmark☆21Updated 2 weeks ago
- DefectDojo Community Content☆18Updated 6 months ago
- Add a layer of active defense to your cloud applications.☆90Updated 3 weeks ago
- ☆51Updated 3 years ago
- ☆19Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆52Updated 2 years ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆50Updated this week
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆31Updated 10 months ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆46Updated last year
- Wazuh - Release for Bosh.io☆11Updated last year
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆81Updated this week
- SideKEK library - inexpensive means to protect cryptographic master keys (key encryption keys, KEKs) in a way that is resistant to some o…☆23Updated 4 years ago
- Custom Kibana dashboards to secure and monitor Microsoft 365.☆13Updated last year
- ☆10Updated last year
- CLI tool for interacting with GPT, analyze local files, etc.☆16Updated last month
- A Secure Controls Framework (SCF) Power BI App☆16Updated 5 months ago