nvthanh1994 / emu

This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense

Home Page:https://caldera.mitre.org/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CALDERA plugin: Emu

A plugin supplying CALDERA with TTPs from the Center for Threat Informed Defense Adversary Emulation Plans.

Each emulation plan will have an adversary and a set of facts. Please ensure to select the related facts to the adversary when starting an operation. Some adversaries may require additional payloads and executables to be downloaded. Run the download_payloads.sh script to download these binaries to the payloads directory.

Because some payloads within the Adversary Emulation Library are encrypted, a Python script is used to automate the decryption which requires the installation of the pyminizip module. Depending on the host OS, pyminizip can be installed using the following:

  • Ubuntu: apt-get install zlib1g
  • MacOS: homebrew install zlib
  • All OS's: pip3 install pyminizip

See URL for more information regarding pyminizip: https://github.com/smihica/pyminizip

Acknowledgements

About

This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense

https://caldera.mitre.org/

License:Apache License 2.0


Languages

Language:PowerShell 93.6%Language:Python 2.5%Language:VBScript 2.2%Language:Perl 1.1%Language:Shell 0.4%Language:HTML 0.3%