🛡️ Active Directory attack path collector and analyzer. Map AD, uncover privilege paths, and visualize attack surfaces. Fully offline and transparent.
-
Updated
Apr 14, 2026 - Python
🛡️ Active Directory attack path collector and analyzer. Map AD, uncover privilege paths, and visualize attack surfaces. Fully offline and transparent.
A graph-first, agentic security framework for AWS that models cloud environments as attack graphs. Leverages LangGraph and Neo4j to perform recursive attack path analysis and autonomous remediation reasoning. Designed for the 'Assumed Breach' era.
Active Directory attack-path analysis lab simulating an internal penetration test. Includes LDAP, Kerberos, SMB enumeration, BloodHound graph analysis, privilege escalation reasoning, and professional documentation of security misconfigurations in a controlled lab environment.
High-signal, read-only IAM analysis tool that detects privilege escalation paths via Service Account impersonation and trust overlap in Google Cloud.
Monitor your cloud assets.
Graph-based cyber attack propagation and blast radius simulator for enterprise environments. Models lateral movement, privilege escalation, and remediation impact using attack graphs.
PivotMap is an open-source attack path intelligence engine for offensive security teams. It ingests scan results, correlates vulnerabilities, builds a directed attack graph, and identifies realistic compromise paths. PivotMap focuses on reasoning, not scanning.
Add a description, image, and links to the attack-path-analysis topic page so that developers can more easily learn about it.
To associate your repository with the attack-path-analysis topic, visit your repo's landing page and select "manage topics."