adversary-emulation-map
Adversary map
Creates an interactive visualization of an adversary emulation plan
Creates an ATT&CK Navigator map of an Adversary Emulation Plan
16 stars
2 watching
5 forks
Language: Python
last commit: about 4 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Automates reconnaissance and service enumeration of network hosts to gather information and write recommendations for further testing. | 2,124 |
| | Provides tools and techniques for simulating AI-enabled system attacks in a controlled environment. | 85 |
| | Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,011 |
| | Automates adversary emulation and incident response using a framework built on the MITRE ATT&CK model | 5,722 |
| | Extracts and decodes data from Controller Area Networks | 38 |
| | An Active Directory reconnaissance tool that uses ADSI and reflective DLLs to enumerate domain information and query user, group, and computer objects. | 316 |
| | An adversary emulation platform used to test and improve network security defenses by simulating malware infections | 6,697 |
| | Provides a collection of plans to test defenses against real-world cyber threats. | 1,737 |
| | An automated reconnaissance tool for vulnerability scanning and identification. | 429 |
| | A tool to generate adversarial text examples and test machine learning models against them | 399 |
| | Detects and mitigates advanced threat tradecraft by analyzing system events and behavior patterns | 2,246 |
| | An advanced reconnaissance utility designed to simplify web application reconnaissance | 964 |
| | A Cobalt Strike Aggressor Script that performs stealthy system and AV/EDR reconnaissance using native registry queries. | 322 |
| | Tools for simulating adversary behaviors on Linux endpoints | 297 |
| | A Python package to create interactive maps of geographical datasets | 341 |