Automated Adversary Emulation Platform
-
Updated
May 12, 2024 - Python
Automated Adversary Emulation Platform
A command and control framework.
Infection Monkey - An open-source adversary emulation platform
Caldera for OT Plugin
Kubernetes Attack Graph
A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.
Repo containing cracked red teaming tools.
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Utilities for MITRE™ ATT&CK
Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on
The Security Automation Toolkit
ATT&CK Evaluations Website
The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activities associated with its practice.
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).
All-In-One: Purple Teaming Exercises with Open-Source Tools
An automated Cyber Threat Intelligence (CTI) apparatus, implemented via a suite of Free & Open-source Software (FOSS)
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
Run tests from the Atomic Red Team framework through Go
This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense
Monarch - The Adversary Emulation Toolkit
Add a description, image, and links to the adversary-emulation topic page so that developers can more easily learn about it.
To associate your repository with the adversary-emulation topic, visit your repo's landing page and select "manage topics."