Infection Monkey - An open-source adversary emulation platform
-
Updated
Apr 12, 2024 - Python
Infection Monkey - An open-source adversary emulation platform
Automated Adversary Emulation Platform
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Utilities for MITRE™ ATT&CK
Kubernetes Attack Graph
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).
Go shellcode loader that combines multiple evasion techniques
indirect syscalls for AV/EDR evasion in Go assembly
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
MITRE Caldera™ for OT Plugins & Capabilities
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on
Repo containing cracked red teaming tools.
Solid Python toolkit for those in the security industry. Some by me, most by smarter people.
Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"
Manticore Adversary Emulation Cli
Add a description, image, and links to the adversary-emulation topic page so that developers can more easily learn about it.
To associate your repository with the adversary-emulation topic, visit your repo's landing page and select "manage topics."