blacklanternsecurity / enter_the_matrix
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆25Updated 2 years ago
Alternatives and similar repositories for enter_the_matrix:
Users that are interested in enter_the_matrix are comparing it to the libraries listed below
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- ☆34Updated last year
- ☆32Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆24Updated last week
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated last month
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- ☆34Updated last year
- Convert Nmap output for integration with other Project Discovery tools☆15Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- ☆19Updated last year
- Sniffing out well-known threat groups☆28Updated 7 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- ☆46Updated 2 weeks ago
- Bloodhound Portable for Windows☆51Updated last year
- CSIRT Jump Bag☆26Updated 11 months ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated 11 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- Bulk hostname lookup using shodan☆15Updated 2 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆25Updated last year
- ☆10Updated 7 months ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆16Updated 3 years ago
- Can you pay the ransom in your country?☆14Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated 11 months ago
- Hashes of infamous malware☆26Updated last year