adversary_emulation_library
Cyber threat testing framework
Provides a collection of plans to test defenses against real-world cyber threats.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
2k stars
141 watching
314 forks
Language: C
last commit: almost 2 years ago
Linked from 1 awesome list
adversary-emulationadversary-emulation-plansctidcyber-threat-intelligencecybersecuritymitre-attackred-teamthreat-informed-defense
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An interactive platform for teaching and demonstrating attack and defense concepts in cybersecurity | 15 |
| | Automates adversary emulation and incident response using a framework built on the MITRE ATT&CK model | 5,722 |
| | Tools for testing and verifying threat detection rules | 322 |
| | A repository providing threat intelligence data in STIX format for security analysis and automation | 1,765 |
| | An AI research challenge and platform to test autonomous cyber defense capabilities using a simulated environment. | 46 |
| | Provides a tool to emulate offensive attack techniques in the cloud | 1,863 |
| | An advanced threat intelligence framework that integrates real-time IP reputation and historical data analysis to identify malicious traffic | 239 |
| | Provides tools and techniques for simulating AI-enabled system attacks in a controlled environment. | 85 |
| | A collection of resources and training materials focused on threat hunting and cyber-threat intelligence. | 13 |
| | Provides a list of feeds for collecting threat intelligence data from various sources | 66 |
| | Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,011 |
| | A testbed designed to highlight common flaws in cryptographic implementations through a configurable CTF-style challenge. | 192 |
| | An adversary emulation platform used to test and improve network security defenses by simulating malware infections | 6,697 |
| | A command-line interface to query threat intelligence data from ThreatCrowd.org | 19 |
| | A collection of tools and resources for threat hunters to identify and respond to cyber threats. | 861 |