ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆27Apr 1, 2026Updated last month
Alternatives and similar repositories for enter_the_matrix
Users that are interested in enter_the_matrix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 3 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Jun 23, 2021Updated 4 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- ☆20Jul 19, 2021Updated 4 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- ☆16May 13, 2021Updated 5 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- ☆12Sep 29, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Apr 1, 2026Updated last month
- Create machine images containing the Guacamole remote desktop gateway☆11Apr 30, 2026Updated 3 weeks ago
- Rust crate to obfuscate strings and byte arrays so they are not in memory when not in use.☆21Apr 30, 2026Updated 3 weeks ago
- This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-2…☆33Oct 24, 2023Updated 2 years ago
- Generate IDN homographs and phishing domains☆12Aug 21, 2023Updated 2 years ago
- An app dev framework for no-code user automations☆12Jan 29, 2023Updated 3 years ago
- A multi-threaded port scanner implementation in Python☆12May 30, 2023Updated 2 years ago
- Semantic prefix map registry☆14May 9, 2026Updated 2 weeks ago
- Create a lnk shortcut file for Windows☆25Apr 1, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,492Apr 1, 2026Updated last month
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- DeTT&CT Editor☆12Apr 29, 2026Updated 3 weeks ago
- Agent Orchestration Command Center☆36Dec 7, 2025Updated 5 months ago
- Going through http://hacking-printers.net/☆39Apr 23, 2017Updated 9 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Notes on managing and coordinating the response to major cyber incidents☆41May 30, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Wall of Flippers is designed to find Flipper Zero devices using BLE (Bluetooth Low Energy)☆13Jan 16, 2026Updated 4 months ago
- POC tool to abuse windows server failover clusters☆56Aug 7, 2025Updated 9 months ago
- GUI program to generate windows and SQL audit files for nessus☆14Jun 23, 2017Updated 8 years ago
- Frida Memory Dumper and Scanner for native Linux apps and Windows apps☆20Oct 18, 2022Updated 3 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 3 years ago
- Twintelligence is a free Twitter OSINT tool☆51Dec 8, 2020Updated 5 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 13 years ago