blacklanternsecurity / enter_the_matrixLinks
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆26Updated 2 years ago
Alternatives and similar repositories for enter_the_matrix
Users that are interested in enter_the_matrix are comparing it to the libraries listed below
Sorting:
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆47Updated 3 months ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- ☆34Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆28Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated 2 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last month
- ☆33Updated last year
- random scripts and utilities used for pentesting or R&D purposes☆9Updated last year
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Updated 4 years ago
- Virtual Security Operations Center☆51Updated last year
- ☆32Updated 2 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆26Updated 4 months ago
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆32Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- URL fingerprinting made easy☆87Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year