blacklanternsecurity / enter_the_matrix
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆25Updated last year
Alternatives and similar repositories for enter_the_matrix:
Users that are interested in enter_the_matrix are comparing it to the libraries listed below
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆26Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated this week
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆29Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆39Updated 3 weeks ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month
- Bulk hostname lookup using shodan☆15Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- ☆46Updated last month
- Bloodhound Portable for Windows☆51Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 2 years ago
- self-hosted Azure OSINT tool☆25Updated 4 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Send High & New Incidents to The Hive incident management Platform☆18Updated 3 years ago
- ☆41Updated 9 months ago
- Hashes of infamous malware☆25Updated last year
- ☆58Updated last year
- Virtual Security Operations Center☆50Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago