{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"epv-api-scripts","owner":"cyberark","isFork":false,"description":"These API scripts enable CyberArk users to automate privileged account management task like account creation, user management, and more.","allTopics":["automation","rest-api","powershell-scripts","privileged-access-security","privileged-access-management"],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":8,"starsCount":193,"forksCount":174,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T20:29:01.211Z"}},{"type":"Public","name":"Secret-Manager-formerly-AAM","owner":"cyberark","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":1,"issueCount":6,"starsCount":0,"forksCount":6,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-17T18:10:10.055Z"}},{"type":"Public","name":"psm","owner":"cyberark","isFork":false,"description":"Ansible role to deploy Cyberark Privileged Session Manager","allTopics":["automation","ansible-role","cyberark","conjbot-skip-stalepr"],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":10,"issueCount":5,"starsCount":15,"forksCount":12,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-08-01T23:02:17.349Z"}},{"type":"Public","name":"cpm","owner":"cyberark","isFork":false,"description":"Ansible role to deploy Cyberark Central Policy Manager","allTopics":["automation","ansible-role","cyberark","conjbot-skip-stalepr"],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":8,"issueCount":0,"starsCount":14,"forksCount":12,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-05T08:51:43.973Z"}},{"type":"Public","name":"ketshash","owner":"cyberark","isFork":false,"description":"A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":168,"forksCount":50,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-08T08:44:45.397Z"}},{"type":"Public","name":"BloodHound","owner":"cyberark","isFork":true,"description":"Six Degrees of Domain Admin","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":1,"issueCount":0,"starsCount":5,"forksCount":1699,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-08T08:43:24.385Z"}},{"type":"Public","name":"CP-MECM-Upgrade-Script","owner":"cyberark","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-14T15:10:02.394Z"}},{"type":"Public","name":"SkyArk","owner":"cyberark","isFork":false,"description":"SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS","allTopics":["aws","cloud","powershell","azure","privileges","security-tools","cloud-security","admins","threat","attacker"],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":6,"starsCount":854,"forksCount":156,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-20T18:26:01.462Z"}},{"type":"Public","name":"CYBRHardeningCheck","owner":"cyberark","isFork":false,"description":"A utility to check CyberArk component servers hardening status","allTopics":["powershell","cyberark","hardening-checks"],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":4,"issueCount":20,"starsCount":51,"forksCount":24,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-01T21:01:01.809Z"}},{"type":"Public","name":"conjur-api-powershell","owner":"cyberark","isFork":true,"description":"Conjur client API library for Powershell https://www.conjur.org","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":1,"issueCount":0,"starsCount":1,"forksCount":6,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-03-11T12:47:05.766Z"}},{"type":"Public","name":"EasyPeasy","owner":"cyberark","isFork":false,"description":"Find accounts using common and default passwords in Active Directory.","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":1,"starsCount":64,"forksCount":18,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-09-19T20:32:28.001Z"}},{"type":"Public","name":"ACLight","owner":"cyberark","isFork":false,"description":"A script for advanced discovery of Privileged Accounts - includes Shadow Admins","allTopics":["powershell","active-directory","acl","account-management","shadow-admin"],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":2,"starsCount":774,"forksCount":144,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-09-09T06:48:45.258Z"}},{"type":"Public","name":"PreCog","owner":"cyberark","isFork":false,"description":"Discover \"HotSpots\" - potential spots for credentials theft","allTopics":["powershell","network","secure","cyber","defense"],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":23,"forksCount":3,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-04-12T19:12:26.258Z"}},{"type":"Public","name":"Mystique","owner":"cyberark","isFork":true,"description":"PowerShell module to play with Kerberos S4U extensions","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":23,"forksCount":12,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-09-14T18:49:04.928Z"}},{"type":"Public","name":"RiskySPN","owner":"cyberark","isFork":false,"description":"Detect and abuse risky SPNs","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":3,"starsCount":259,"forksCount":71,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-06-15T07:41:18.416Z"}}],"repositoryCount":15,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"cyberark repositories"}