paulveillard / cybersecurity-pam
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
☆23Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for cybersecurity-pam
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆21Updated 2 years ago
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆15Updated this week
- Automation tool for Windows Deception Host Burn-In☆76Updated 4 months ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆14Updated 2 years ago
- ☆18Updated 3 years ago
- Open source incident management and response platform.☆11Updated 6 years ago
- ☆67Updated 8 months ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about General Data…☆14Updated last year
- DefectDojo Community Content☆17Updated last month
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆72Updated this week
- An Open Source all-in-one application for the privacy, security, and compliance teams.☆35Updated last month
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆45Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆13Updated last week
- An ongoing & curated collection of awesome AuthN+Z software, libraries and frameworks, best guidelines and technical resources and cool s…☆16Updated 11 months ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆15Updated 3 months ago
- Add a layer of active defense to your cloud applications.☆82Updated this week
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆35Updated last month
- ☆31Updated this week
- ☆15Updated last year
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆9Updated 4 years ago
- A Secure Controls Framework (SCF) Power BI App☆16Updated 3 weeks ago
- Scripts to deploy and update MISP in air-gapped environments☆16Updated 3 months ago
- Generated a compliance checklist report, asset register and risk register. Implemented policies on various controls of ISO27001:2013 stan…☆26Updated 3 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆35Updated 10 months ago
- Wazuh Agent as Docker Image☆21Updated 6 months ago
- Efficient DevSecOps☆47Updated this week
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆29Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Updated 9 months ago
- ☆15Updated 3 years ago