Infection Monkey - An open-source adversary emulation platform
-
Updated
Jun 27, 2023 - Python
Infection Monkey - An open-source adversary emulation platform
Automated Adversary Emulation Platform
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Utilities for MITRE™ ATT&CK
A place to share attack chains for testing people, process, and technology with the entire community. The largest, public library of adversary emulation and adversary simulation plans! #ThreatThursday
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Azure AD.
Go shellcode loader that combines multiple evasion techniques
indirect syscalls for AV/EDR evasion in Go assembly
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
Manticore Adversary Emulation Cli
Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"
ATT&CK Evaluations Website
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense
Add a description, image, and links to the adversary-emulation topic page so that developers can more easily learn about it.
To associate your repository with the adversary-emulation topic, visit your repo's landing page and select "manage topics."