metta
Attack simulator
An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems.
An information security preparedness tool to do adversarial simulation.
1k stars
75 watching
153 forks
Language: Python
last commit: almost 6 years ago
Linked from 3 awesome lists
adversarialceleryinfosecnetworknetworkingpythonredissecuritysimulationubervagrantvirtualboxyaml
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool designed to simulate malicious behavior against Google Workspace environments for threat research and detection rule effectiveness testing | 163 |
| A collaboration to create realistic test environments for simulating real-world attacks and improving detection strategies. | 704 |
| A toolset for creating and automating customized security events to simulate realistic scenarios for testing and training | 998 |
| A comprehensive cyber adversary simulation platform for planning and conducting simulated attacks and exercises | 765 |
| A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. | 271 |
| A portable set of tests mapped to the MITRE ATT&CK framework for evaluating security environments. | 9,951 |
| Simulates vehicle and robot dynamics in various environments | 302 |
| A tool for simulating phishing attacks in red teaming exercises. | 1,451 |
| A phishing simulation tool that automates illicit consent grant attacks on Azure AD using Python3 and PHP. | 458 |
| An adversary simulation tool for Windows environments to generate attack telemetry and improve detection capabilities. | 782 |
| A utility to generate malicious network traffic patterns and evaluate security controls. | 1,271 |
| A tool for simulating and analyzing potential security threats to Microsoft Windows systems using the MITRE ATT&CK framework. | 208 |
| A toolkit for simulating phishing attacks on Office 365 accounts | 1,043 |
| An intrusion detection system designed to capture and analyze ssh interactions between an attacker and a modified OpenSSH deamon | 26 |
| Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,011 |