paulveillard / cybersecurity-pamLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
☆28Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pam
Users that are interested in cybersecurity-pam are comparing it to the libraries listed below
Sorting:
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆23Updated 3 years ago
- DefectDojo Community Content☆18Updated 7 months ago
- Security Monitoring using Wazuh, published by Packt☆22Updated last year
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 5 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- ☆73Updated 2 months ago
- Add a layer of active defense to your cloud applications.☆92Updated last week
- Open source incident management and response platform.☆12Updated 7 years ago
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆18Updated 2 weeks ago
- CyHy Dashboard☆16Updated this week
- Manage, monitor and improve your cyber security posture.☆90Updated 2 years ago
- The Wazuh agent for endpoints.☆71Updated this week
- ☆52Updated 3 years ago
- The OWASP SAMM Website☆11Updated last week
- Checks whether a Windows server according to security best practices as defined in the CIS Distribution-Independent Windows Benchmark☆21Updated 2 months ago
- MCP Server for Wazuh SIEM☆13Updated 2 weeks ago
- The Vanta Control Set maps common compliance standards from their requirements to controls and provides them in an easy to consume machin…☆10Updated 3 years ago
- NIST OSCAL SDK and CLI☆19Updated this week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆71Updated 3 weeks ago
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆102Updated 7 months ago
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆84Updated 3 weeks ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆93Updated 4 years ago
- Microsoft Defender for Cloud threat matrix for Kubernetes☆25Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 3 months ago
- Run individual controls or full compliance benchmarks for CIS across all of your Microsoft 365 and Office 365 tenants using Powerpipe and…☆26Updated 3 months ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆17Updated 9 months ago
- Overview of existing mappings from and to cyber security controls☆15Updated last year
- This repository is dedicated to providing resources, information, and tools related to the NIS2 Directive, a European Union regulation ai…☆20Updated last month
- T-Guard Repository☆15Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆22Updated 4 months ago