caldera
Adversary emulator
Automates adversary emulation and incident response using a framework built on the MITRE ATT&CK model
Automated Adversary Emulation Platform
6k stars
171 watching
1k forks
Language: Python
last commit: 2 months ago
Linked from 2 awesome lists
adversary-emulationcalderacybersecurityhackingmitremitre-attackmitre-corporationred-teamsecurity-automationsecurity-testing
Related projects:
Repository | Description | Stars |
---|---|---|
| Provides tools and techniques for simulating AI-enabled system attacks in a controlled environment. | 85 |
| Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,011 |
| Automates testing of cybersecurity detection and response capabilities in a controlled network environment | 202 |
| A framework to help security analysts understand and prepare for adversarial machine learning attacks on AI systems | 1,056 |
| A portable set of tests mapped to the MITRE ATT&CK framework for evaluating security environments. | 9,951 |
| An adversary emulation platform used to test and improve network security defenses by simulating malware infections | 6,697 |
| Provides an API wrapper for the Mitre ATT&CK framework | 26 |
| Provides a collection of plans to test defenses against real-world cyber threats. | 1,737 |
| A repository providing threat intelligence data in STIX format for security analysis and automation | 1,765 |
| An integration tool for Maltego to leverage MISP threat intelligence and the MITRE ATT&CK dataset | 171 |
| This repository provides a setup and framework for investigating irreversible backdoor attacks in Federated Learning systems. | 31 |
| A comprehensive resource for understanding and visualizing the relationships between different types of cyber attacks and their tactics, techniques, and procedures. | 18 |
| A set of scripts to detect and analyze cyber adversary activity using Bro/Zeek network security monitor | 570 |
| Tools for simulating adversary behaviors on Linux endpoints | 297 |
| Provides Windows log event indicators mapped to MITRE ATT&CK tactic and techniques | 532 |