ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆27Apr 1, 2026Updated last week
Alternatives and similar repositories for enter_the_matrix
Users that are interested in enter_the_matrix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 3 years ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Jan 17, 2024Updated 2 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆22Apr 1, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Apr 1, 2026Updated last week
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆16Jun 23, 2021Updated 4 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 2 months ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆30Apr 1, 2026Updated last week
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 4 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- ☆20Jul 19, 2021Updated 4 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- ☆16May 13, 2021Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆65May 13, 2021Updated 4 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 11 months ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- ☆12Sep 29, 2025Updated 6 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Apr 1, 2026Updated last week
- Create machine images containing the Guacamole remote desktop gateway☆11Mar 16, 2026Updated 3 weeks ago
- ☆15Jan 27, 2022Updated 4 years ago
- Rust crate to obfuscate strings and byte arrays so they are not in memory when not in use.☆21Mar 2, 2026Updated last month
- This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-2…☆33Oct 24, 2023Updated 2 years ago
- Generate IDN homographs and phishing domains☆13Aug 21, 2023Updated 2 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- An app dev framework for no-code user automations☆12Jan 29, 2023Updated 3 years ago
- Semantic prefix map registry☆14Feb 20, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Create a lnk shortcut file for Windows☆24Apr 1, 2026Updated last week
- My conference presentations☆87Nov 11, 2025Updated 5 months ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Git+Ansible: watch git repo for changes and run only changed playbooks☆16Jan 23, 2023Updated 3 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,481Apr 1, 2026Updated last week
- A Rust-based agent orchestrator enabling a swarm of Claude Code instances building software.☆39Apr 4, 2026Updated last week
- ☆24Apr 12, 2025Updated last year