caldera
Adversary emulator
Automates adversary emulation and incident response using a framework built on the MITRE ATT&CK model
Automated Adversary Emulation Platform
6k stars
171 watching
1k forks
Language: Python
last commit: 20 days ago
Linked from 2 awesome lists
adversary-emulationcalderacybersecurityhackingmitremitre-attackmitre-corporationred-teamsecurity-automationsecurity-testing
Related projects:
Repository | Description | Stars |
---|---|---|
mitre-atlas/arsenal | A plugin for simulating adversarial tactics against AI-enabled systems | 85 |
nshalabi/attack-tools | Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,012 |
mitre/brawl-public-game-001 | Automates testing of cybersecurity detection and response capabilities in a controlled network environment | 202 |
mitre/advmlthreatmatrix | A framework to help security analysts understand and prepare for adversarial machine learning attacks on AI systems | 1,050 |
redcanaryco/atomic-red-team | A portable set of tests mapped to the MITRE ATT&CK framework for evaluating security environments. | 9,782 |
guardicore/monkey | An adversary emulation platform used to test and improve network security defenses by simulating malware infections | 6,678 |
malwaresoup/mitreattack | Provides an API wrapper for the Mitre ATT&CK framework | 26 |
center-for-threat-informed-defense/adversary_emulation_library | Provides a collection of plans to test defenses against real-world cyber threats. | 1,723 |
mitre/cti | A repository providing threat intelligence data in STIX format for security analysis and automation | 1,749 |
misp/misp-maltego | An integration tool for Maltego to leverage MISP threat intelligence and the MITRE ATT&CK dataset | 170 |
sail-research/iba | This repository provides a setup and framework for investigating irreversible backdoor attacks in Federated Learning systems. | 29 |
cybersecurityup/mitre-attack-matrix | A comprehensive resource for understanding and visualizing the relationships between different types of cyber attacks and their tactics, techniques, and procedures. | 18 |
mitre-attack/bzar | A set of scripts to detect and analyze cyber adversary activity using Bro/Zeek network security monitor | 565 |
redcanaryco/chain-reactor | Tools for simulating adversary behaviors on Linux endpoints | 292 |
mdecrevoisier/evtx-to-mitre-attack | Provides Windows log event indicators mapped to MITRE ATT&CK tactic and techniques | 527 |