blacklanternsecurity / enter_the_matrixLinks
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆26Updated 2 years ago
Alternatives and similar repositories for enter_the_matrix
Users that are interested in enter_the_matrix are comparing it to the libraries listed below
Sorting:
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated 2 weeks ago
- ☆34Updated 2 years ago
- ☆47Updated 4 months ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Updated 4 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- General scripts that gather information out of Active Directory☆16Updated 3 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- ☆32Updated 2 years ago
- Bulk hostname lookup using shodan☆15Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- ☆33Updated last year
- ☆24Updated 6 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆54Updated 4 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated 2 years ago
- ☆114Updated 4 years ago
- DEFCON 31 slide deck and video link☆64Updated 2 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago
- ☆80Updated 2 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year
- Hashes of infamous malware☆26Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week