An automated Cyber Threat Intelligence (CTI) apparatus, implemented via a suite of Free & Open-source Software (FOSS)
-
Updated
Feb 24, 2024 - Python
An automated Cyber Threat Intelligence (CTI) apparatus, implemented via a suite of Free & Open-source Software (FOSS)
A blog about cyber security and life. coming. soonish.
Run tests from the Atomic Red Team framework through Go
All-In-One: Purple Teaming Exercises with Open-Source Tools
AtomicThreatProfile is a Python script that creates custom adversary profiles for use in Caldera using json formatted data from Control Validation Compass
A simple powershell script to execute one liner commands in windows
Sliver Extension to monitor target's screen and automatically grab QRCodes displayed during MFA enrollement
opyrator is a REST API client library for Prelude Operator.
Caldera for OT Plugin
A CALDERA plugin
An REST API client library for Prelude Operator.
The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activities associated with its practice.
The Security Automation Toolkit
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to do this with some level of stealth.
A command and control framework.
Add a description, image, and links to the adversary-emulation topic page so that developers can more easily learn about it.
To associate your repository with the adversary-emulation topic, visit your repo's landing page and select "manage topics."