adversary-emulation-map
Adversary map
Creates an interactive visualization of an adversary emulation plan
Creates an ATT&CK Navigator map of an Adversary Emulation Plan
16 stars
2 watching
5 forks
Language: Python
last commit: over 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Automates reconnaissance and service enumeration of network hosts to gather information and write recommendations for further testing. | 2,124 |
| Provides tools and techniques for simulating AI-enabled system attacks in a controlled environment. | 85 |
| Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,011 |
| Automates adversary emulation and incident response using a framework built on the MITRE ATT&CK model | 5,722 |
| Extracts and decodes data from Controller Area Networks | 38 |
| An Active Directory reconnaissance tool that uses ADSI and reflective DLLs to enumerate domain information and query user, group, and computer objects. | 316 |
| An adversary emulation platform used to test and improve network security defenses by simulating malware infections | 6,697 |
| Provides a collection of plans to test defenses against real-world cyber threats. | 1,737 |
| An automated reconnaissance tool for vulnerability scanning and identification. | 429 |
| A tool to generate adversarial text examples and test machine learning models against them | 399 |
| Detects and mitigates advanced threat tradecraft by analyzing system events and behavior patterns | 2,246 |
| An advanced reconnaissance utility designed to simplify web application reconnaissance | 964 |
| A Cobalt Strike Aggressor Script that performs stealthy system and AV/EDR reconnaissance using native registry queries. | 322 |
| Tools for simulating adversary behaviors on Linux endpoints | 297 |
| A Python package to create interactive maps of geographical datasets | 341 |