Automated Adversary Emulation Platform
-
Updated
May 12, 2024 - Python
Automated Adversary Emulation Platform
Infection Monkey - An open-source adversary emulation platform
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Utilities for MITRE™ ATT&CK
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).
Go shellcode loader that combines multiple evasion techniques
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
indirect syscalls for AV/EDR evasion in Go assembly
Kubernetes Attack Graph
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
MITRE Caldera™ for OT Plugins & Capabilities
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
Repo containing cracked red teaming tools.
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense
ATT&CK Evaluations Website
Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on
Add a description, image, and links to the adversary-emulation topic page so that developers can more easily learn about it.
To associate your repository with the adversary-emulation topic, visit your repo's landing page and select "manage topics."