adversary_emulation_library
Cyber threat testing framework
Provides a collection of plans to test defenses against real-world cyber threats.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
2k stars
141 watching
313 forks
Language: C
last commit: 11 months ago
Linked from 1 awesome list
adversary-emulationadversary-emulation-plansctidcyber-threat-intelligencecybersecuritymitre-attackred-teamthreat-informed-defense
Related projects:
Repository | Description | Stars |
---|---|---|
patrickwire/attack-defense-ctf-demo | An interactive platform for teaching and demonstrating attack and defense concepts in cybersecurity | 15 |
mitre/caldera | Automates adversary emulation and incident response using a framework built on the MITRE ATT&CK model | 5,653 |
datadog/threatest | Tools for testing and verifying threat detection rules | 319 |
mitre/cti | A repository providing threat intelligence data in STIX format for security analysis and automation | 1,749 |
cage-challenge/cage-challenge-2 | An AI research challenge and platform to test autonomous cyber defense capabilities using a simulated environment. | 46 |
datadog/stratus-red-team | Provides a tool to emulate offensive attack techniques in the cloud | 1,825 |
cred-club/artif | An advanced threat intelligence framework that integrates real-time IP reputation and historical data analysis to identify malicious traffic | 236 |
mitre-atlas/arsenal | A plugin for simulating adversarial tactics against AI-enabled systems | 85 |
ch33r10/bluespace2021 | A collection of resources and training materials focused on threat hunting and cyber-threat intelligence. | 13 |
certtools/intelmq-feeds-documentation | Provides a list of feeds for collecting threat intelligence data from various sources | 64 |
nshalabi/attack-tools | Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,012 |
spiderlabs/cryptomg | A configurable test environment to demonstrate common flaws in cryptographic implementations. | 191 |
guardicore/monkey | An adversary emulation platform used to test and improve network security defenses by simulating malware infections | 6,678 |
jheise/threatcmd | A command-line interface to query threat intelligence data from ThreatCrowd.org | 19 |
a3sal0n/cyberthreathunting | A collection of tools and resources for threat hunters to identify and respond to cyber threats. | 855 |