Infection Monkey - An open-source adversary emulation platform
-
Updated
Dec 16, 2024 - Python
Infection Monkey - An open-source adversary emulation platform
Automated Adversary Emulation Platform
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense
A tool to generate macOS initial access vectors using Prelude Operator payloads
AtomicThreatProfile is a Python script that creates custom adversary profiles for use in Caldera using json formatted data from Control Validation Compass
opyrator is a REST API client library for Prelude Operator.
Caldera for OT Plugin
An automated Cyber Threat Intelligence (CTI) apparatus, implemented via a suite of Free & Open-source Software (FOSS)
Generate PDF reports from JSON files exported from Caldera using the ReportLab library
Add a description, image, and links to the adversary-emulation topic page so that developers can more easily learn about it.
To associate your repository with the adversary-emulation topic, visit your repo's landing page and select "manage topics."