blacklanternsecurity / enter_the_matrix
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆24Updated last year
Related projects: ⓘ
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Bloodhound Portable for Windows☆51Updated last year
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- ☆20Updated this week
- Stupid Simple Detection Testing☆11Updated 6 months ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆20Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆37Updated last month
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆24Updated last year
- A MITRE ATT&CK Lookup Tool☆41Updated 4 months ago
- repository containing some nmap scripts☆11Updated 3 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆38Updated 3 years ago
- Hashes of infamous malware☆24Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆29Updated 2 months ago
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 2 months ago
- Can you pay the ransom in your country?☆13Updated 9 months ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆22Updated 2 years ago
- Wireless Pentesting Device☆17Updated 4 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆12Updated 3 years ago
- Automatic detection engineering technical state compliance☆49Updated 2 months ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"☆50Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 4 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated 2 weeks ago
- ☆40Updated 5 months ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆16Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago