ATTACK-Tools

Adversary simulator

Utilities for simulating adversary behavior in the context of threat intelligence and security analysis

Utilities for MITRE™ ATT&CK

GitHub

1k stars
73 watching
214 forks
Language: HTML
last commit: 6 months ago
adversary-emulationmitremitre-attackredteamredteaming

Related projects:

Repository Description Stars
redcanaryco/atomic-red-team A portable set of tests mapped to the MITRE ATT&CK framework for evaluating security environments. 9,811
mitre/caldera Automates adversary emulation and incident response using a framework built on the MITRE ATT&CK model 5,668
mitre/advmlthreatmatrix A framework to help security analysts understand and prepare for adversarial machine learning attacks on AI systems 1,050
mitre-atlas/arsenal A plugin for simulating adversarial tactics against AI-enabled systems 85
n0dec/malwless A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. 271
martabyte/red-team-ops A collection of tools and techniques for simulating cyber attacks on computer systems 19
mitre/brawl-public-game-001 Automates testing of cybersecurity detection and response capabilities in a controlled network environment 202
sbasu7241/aws-threat-simulation-and-detection This repository documents the simulation and detection of various AWS attack scenarios using Stratus Red Team and SumoLogic for logging and analysis. 282
qax-a-team/cobaltstrike-toolset A collection of tools and scripts used to simulate cyber attacks 532
infosecn1nja/red-teaming-toolkit A collection of tools to simulate an adversary's actions and test security controls 9,116
splunk/attack_range A tool to simulate attacks against virtual environments and collect data into Splunk for detection development 2,162
a-poc/redteam-tools A collection of tools and resources for simulating a red teaming attack on computer systems. 6,033
airbnb/artificial-adversary A tool to generate adversarial text examples and test machine learning models against them 397
cybersecurityup/mitre-attack-matrix A comprehensive resource for understanding and visualizing the relationships between different types of cyber attacks and their tactics, techniques, and procedures. 18
redcanaryco/chain-reactor Tools for simulating adversary behaviors on Linux endpoints 292