blacklanternsecurity / enter_the_matrixLinks
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆25Updated 2 years ago
Alternatives and similar repositories for enter_the_matrix
Users that are interested in enter_the_matrix are comparing it to the libraries listed below
Sorting:
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆28Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Wireless Pentesting Device☆22Updated 4 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆16Updated 4 years ago
- Sniffing out well-known threat groups☆28Updated 10 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- ☆34Updated 2 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- ☆32Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Updated last year
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated last year
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆27Updated this week
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated last week
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated 3 months ago
- Hashes of infamous malware☆26Updated last year
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 2 weeks ago
- ☆33Updated last year
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- A user enumeration tool for Slack.☆28Updated last year