A CALDERA plugin
-
Updated
Jan 16, 2020 - JavaScript
A CALDERA plugin
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Manticore Adversary Emulation Cli
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
An REST API client library for Prelude Operator.
opyrator is a REST API client library for Prelude Operator.
Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
A tool to generate macOS initial access vectors using Prelude Operator payloads
Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to do this with some level of stealth.
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
AtomicThreatProfile is a Python script that creates custom adversary profiles for use in Caldera using json formatted data from Control Validation Compass
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
indirect syscalls for AV/EDR evasion in Go assembly
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
Add a description, image, and links to the adversary-emulation topic page so that developers can more easily learn about it.
To associate your repository with the adversary-emulation topic, visit your repo's landing page and select "manage topics."