A "Swiss Army Knife" command-line interface (CLI) for easy human and non-human interaction with @cyberark suite of products.
-
Updated
Aug 19, 2025 - Go
A "Swiss Army Knife" command-line interface (CLI) for easy human and non-human interaction with @cyberark suite of products.
A modern, extensible framework for defining and enforcing security policies across your digital infrastructure.
Small scripts and targeted tools created by Trimarc staff to help solve common issues in Identity Security.
senhasegura Identity Threat Labs is a premier threat intelligence center specializing in predictive analysis of identity-focused attack vectors. Using reverse engineering, malware analysis, and threat intelligence, our lab identifies emerging threats and provides actionable reports to help organizations strengthen defenses and mitigate risks.
ITDR (Identity Threat Detection and Response) platform with ML-powered anomaly detection, UEBA, risk scoring, and role mining
A PowerShell tool to identify and audit user-consented applications in Microsoft Entra ID (Azure AD), with a focus on uncovering "Shadow IT" and security risks.
A curated collection of IAM and PAM resources, insights, best practices, and implementation guidance based on my hands-on experience.
A portfolio of completed rooms, challenges, and CTFs from TryHackMe.com, showcasing hands-on experience with real-world cybersecurity scenarios — from hacking machines to investigating attacks. This collection highlights my practical skills across diverse technologies, reflecting my growth and learning through various cybersecurity learning paths.
Deterministic security primitives for tick-bound time, consent, policy, ledger, and transport. Provides the shared invariants that underpin PQHD, PQAI, PQVL, and the broader PQ ecosystem.
PowerShell automation scripts for Microsoft Entra ID auditing using Microsoft Graph and Azure CLI authentication.
A digital immune system designed to detect and neutralize identity-based threats from within an organization
Free ULP Search Bot
Zero Trust posture assessment — NIST 800-207, CISA maturity scoring
AI-assisted security analytics project exploring Zero Trust architecture through identity and access anomaly detection.
Enterprise Zero Trust Conditional Access architecture implemented in Microsoft Entra ID. Demonstrates phishing resistant MFA, device compliance enforcement, risk based authentication, and staged policy deployment validated through sign in logs.
Hands on lab implementing MFA enforcement using Microsoft Entra ID Conditional Access with policy validation through sign in log analysis.
Identity-centric zero-trust security design and compliance automation
Conditional Access implementation in Microsoft Entra ID demonstrating location based access control using Named Locations, policy enforcement, and validation through sign in log analysis.
Add a description, image, and links to the identity-security topic page so that developers can more easily learn about it.
To associate your repository with the identity-security topic, visit your repo's landing page and select "manage topics."