Skip to content

exploitsecurityio/leviathan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

56 Commits
 
 

Repository files navigation

Leviathan

Threat Modelling Tool [by exploitsecurity.io]

leviathan-icon

Description

Leviathan leverages OpenAI and NMAP to conduct a first level parse of your environment. A basic threat model is formulated using the OWASP STRIDE framework. The Leviathan utility scans a given host or network range and translates the findings into a highlevel overview of potential threats that call for further examination or scrutiny. The WebUI is then presented to the user, which allows for a highlevel overview of potential threats within the environment.

NEXT STEP: Applying a quantifiable lens, the next step would be a penetration test to help solidify the results and to provide mitigations where necessary.

Dependencies

  • Valid OPENAI API key. More info can be found here
  • Docker.io

Docker Installation

docker pull exsec/leviathan:leviathan

Running the utility

sudo docker run -it -p 3000:3000 exsec/leviathan:leviathan

Usage

python3 leviathan.py <host IP Address or Network Range> <valid openai api_key>

Screenshots

image image

Contact

Web: www.exploitsecurity.io

Email: info@exploitsecurity.io

Copyright

Leviathan was developed by The Security Team @ [exploitsecurity.io]

This program is freely redistributable under the terms of the GNU General Public License as published by the Free Software Foundation.

It is the intention that this software adds usefulness, however it is not currently covered under WARRANTY.

GNU General Public License

About

Threat Modelling Tool

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published