blacklanternsecurity / enter_the_matrixLinks
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆26Updated 2 years ago
Alternatives and similar repositories for enter_the_matrix
Users that are interested in enter_the_matrix are comparing it to the libraries listed below
Sorting:
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Updated 5 months ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- ☆34Updated 2 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- ☆50Updated last week
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Updated 4 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last month
- ☆70Updated 2 years ago
- ☆49Updated 3 months ago
- ☆31Updated 2 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year
- ☆33Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.