blacklanternsecurity / enter_the_matrix
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆25Updated last year
Related projects ⓘ
Alternatives and complementary repositories for enter_the_matrix
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆26Updated last year
- Bloodhound Portable for Windows☆51Updated last year
- A MITRE ATT&CK Lookup Tool☆43Updated 6 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- Hashes of infamous malware☆26Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆27Updated 2 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆16Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated last week
- ☆16Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago
- Penguin OS Forensic (or Flight) Recorder☆37Updated 4 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- CSIRT Jump Bag☆27Updated 6 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 3 weeks ago
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- Automatic detection engineering technical state compliance☆50Updated 4 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 3 months ago
- ☆43Updated last month
- A collection of Sigma rules organized by MITRE ATT&CK technique☆16Updated 3 years ago
- Can you pay the ransom in your country?☆14Updated 11 months ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆21Updated last month
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆35Updated last year