blacklanternsecurity / enter_the_matrix
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆25Updated 2 years ago
Alternatives and similar repositories for enter_the_matrix:
Users that are interested in enter_the_matrix are comparing it to the libraries listed below
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆27Updated last year
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- ☆32Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- ☆19Updated last year
- random scripts and utilities used for pentesting or R&D purposes☆9Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆12Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated last year
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year
- ☆34Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆24Updated last week
- repository containing some nmap scripts☆11Updated 4 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated 3 months ago
- Sniffing out well-known threat groups☆28Updated 7 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆10Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- ☆46Updated 3 weeks ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- ☆12Updated 3 years ago
- ☆34Updated last year
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- Random tips and tricks RE: ransomware