There are 24 repositories under adversary-emulation topic.
Infection Monkey - An open-source adversary emulation platform
:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Utilities for MITRE™ ATT&CK
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).
MITRE Caldera™ for OT Plugins & Capabilities
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Repo containing cracked red teaming tools.
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.
Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop
Solid Python toolkit for those in the security industry. Some by me, most by smarter people.
Manticore Adversary Emulation Cli
ATT&CK Evaluations Library
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
A tool to generate macOS initial access vectors using Prelude Operator payloads
The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activities associated with its practice.
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to do this with some level of stealth.
Manticore's Public Threats Repository
شبیه سازی حمله گروه هکرهای دولتی منتسب به روسیه APT 28
Manticore's Public Threat Scenarios