blacklanternsecurity / enter_the_matrixLinks
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mind. Features an API to interact on your data to act as a living database of your executed threat models.
☆26Updated 2 years ago
Alternatives and similar repositories for enter_the_matrix
Users that are interested in enter_the_matrix are comparing it to the libraries listed below
Sorting:
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- ☆34Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 3 months ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated 2 years ago
- ☆47Updated last month
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated this week
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆13Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- ☆49Updated 2 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- ☆44Updated 4 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆34Updated 5 months ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- ☆31Updated 2 years ago