ATTACK-Tools
Adversary simulator
Utilities for simulating adversary behavior in the context of threat intelligence and security analysis
Utilities for MITRE™ ATT&CK
1k stars
73 watching
214 forks
Language: HTML
last commit: 6 months ago adversary-emulationmitremitre-attackredteamredteaming
Related projects:
Repository | Description | Stars |
---|---|---|
redcanaryco/atomic-red-team | A portable set of tests mapped to the MITRE ATT&CK framework for evaluating security environments. | 9,811 |
mitre/caldera | Automates adversary emulation and incident response using a framework built on the MITRE ATT&CK model | 5,668 |
mitre/advmlthreatmatrix | A framework to help security analysts understand and prepare for adversarial machine learning attacks on AI systems | 1,050 |
mitre-atlas/arsenal | A plugin for simulating adversarial tactics against AI-enabled systems | 85 |
n0dec/malwless | A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. | 271 |
martabyte/red-team-ops | A collection of tools and techniques for simulating cyber attacks on computer systems | 19 |
mitre/brawl-public-game-001 | Automates testing of cybersecurity detection and response capabilities in a controlled network environment | 202 |
sbasu7241/aws-threat-simulation-and-detection | This repository documents the simulation and detection of various AWS attack scenarios using Stratus Red Team and SumoLogic for logging and analysis. | 282 |
qax-a-team/cobaltstrike-toolset | A collection of tools and scripts used to simulate cyber attacks | 532 |
infosecn1nja/red-teaming-toolkit | A collection of tools to simulate an adversary's actions and test security controls | 9,116 |
splunk/attack_range | A tool to simulate attacks against virtual environments and collect data into Splunk for detection development | 2,162 |
a-poc/redteam-tools | A collection of tools and resources for simulating a red teaming attack on computer systems. | 6,033 |
airbnb/artificial-adversary | A tool to generate adversarial text examples and test machine learning models against them | 397 |
cybersecurityup/mitre-attack-matrix | A comprehensive resource for understanding and visualizing the relationships between different types of cyber attacks and their tactics, techniques, and procedures. | 18 |
redcanaryco/chain-reactor | Tools for simulating adversary behaviors on Linux endpoints | 292 |