ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆26Mar 3, 2023Updated 2 years ago
Alternatives and similar repositories for enter_the_matrix
Users that are interested in enter_the_matrix are comparing it to the libraries listed below
Sorting:
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Jun 23, 2021Updated 4 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 2 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 3 weeks ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Create a lnk shortcut file for Windows☆24Apr 23, 2019Updated 6 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Aug 26, 2021Updated 4 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- A multi-threaded port scanner implementation in Python☆12May 30, 2023Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆65May 13, 2021Updated 4 years ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 6 months ago
- Hacking environment installation scripts for OS X☆28Jan 16, 2022Updated 4 years ago
- ☆33Dec 10, 2024Updated last year
- ☆10Feb 23, 2026Updated last week
- A repo of scripts I find helpful for daily tasks.☆30Dec 8, 2025Updated 2 months ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Apr 11, 2017Updated 8 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆80Dec 8, 2022Updated 3 years ago
- Clean public password dump files and store in ELK☆37Jan 24, 2018Updated 8 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Agent Orchestration Command Center☆25Dec 7, 2025Updated 2 months ago
- A Rust-based agent orchestrator enabling a swarm of Claude Code instances building software.☆27Feb 8, 2026Updated 3 weeks ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Import Mitre Att&ck into Neo4j database☆39Dec 8, 2022Updated 3 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago