blacklanternsecurity / enter_the_matrix
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆25Updated 2 years ago
Alternatives and similar repositories for enter_the_matrix:
Users that are interested in enter_the_matrix are comparing it to the libraries listed below
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆27Updated last year
- Bulk hostname lookup using shodan☆15Updated 2 years ago
- self-hosted Azure OSINT tool☆29Updated 6 months ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated 3 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- Hashes of infamous malware☆26Updated last year
- ☆34Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated last year
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated 11 months ago
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆76Updated 5 months ago
- ☆19Updated last year
- Bloodhound Portable for Windows☆51Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ☆12Updated 2 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆16Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- ☆32Updated 2 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 5 months ago
- ☆22Updated 4 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago