Tools for managing identities, access controls, and secure credential storage.
Explore 69 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.
Find leaked credentials by scanning repositories for high entropy strings.
Abusing DNSAdmins privilege for escalation in Active Directory
Tool for visualizing and analyzing control paths in Active Directory to determine access privileges and permissions.
Guidelines and best practices for securely storing passwords.
A NodeJS/Typescript library for generating IAM Policy Actions Statements for AWS CDK with predefined constants and a factory class.
BeyondTrust Privileged Access Management (PAM) provides comprehensive security controls for privileged accounts and users.
A tool for finding AWS credentials in files, optimized for Jenkins integration.
Helm plugin for decrypting encrypted Helm value files on the fly and integrating with cloud native secret managers.
Open-source universal secret manager for developers with seamless integration to various cloud services and vaults.
OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.
A list of disposable email domains to detect or block disposable accounts