Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for adversary emulation
adversary-emulation
x
29 search results found
Monkey
⭐
6,414
Infection Monkey - An open-source adversary emulation platform
Caldera
⭐
4,930
Automated Adversary Emulation Platform
Stratus Red Team
⭐
1,539
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Adversary_emulation_library
⭐
1,419
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Attack Tools
⭐
977
Utilities for MITRE™ ATT&CK
Community Threats
⭐
649
A place to share attack chains for testing people, process, and technology with the entire community. The largest, public library of adversary emulation and adversary simulation plans! #ThreatThursday
Kubehound
⭐
552
Kubernetes Attack Graph
Enterprisepurpleteaming
⭐
493
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
Purple Team Exercise Framework
⭐
366
Purple Team Exercise Framework
Maad Af
⭐
314
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).
Hades
⭐
198
Go shellcode loader that combines multiple evasion techniques
Invoke Apex
⭐
175
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Caldera Ot
⭐
161
MITRE Caldera™ for OT Plugins & Capabilities
Ezemu
⭐
93
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Caldera_pathfinder
⭐
84
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
Adversaryemulation
⭐
70
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
Acheron
⭐
38
indirect syscalls for AV/EDR evasion in Go assembly
Monarch
⭐
36
Monarch - The Adversary Emulation Toolkit
Adversarial Threat Modelling
⭐
31
Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"
Python Security Tool Database
⭐
29
Solid Python toolkit for those in the security industry. Some by me, most by smarter people.
Emu
⭐
21
This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense
Website
⭐
20
ATT&CK Evaluations Website
Nicodemus
⭐
11
A cross-platform Nim implant for Prelude Operator
Coyote
⭐
11
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements.
Red Team Tools
⭐
11
Repo containing cracked red teaming tools.
Headhunter
⭐
8
HeadHunter Command and Control (C2) Framework
Ishelly
⭐
8
A tool to generate macOS initial access vectors using Prelude Operator payloads
Manticore Cli
⭐
7
Manticore Adversary Emulation Cli
Public Scenarios
⭐
5
Manticore's Public Threat Scenarios
Related Searches
Red Team Adversary Emulation (19)
Mitre Attack Adversary Emulation (10)
Purpleteam Adversary Emulation (7)
Penetration Testing Adversary Emulation (7)
Golang Adversary Emulation (6)
Mitre Adversary Emulation (6)
Threat Adversary Emulation (5)
Powershell Adversary Emulation (5)
Cybersecurity Adversary Emulation (5)
Python Adversary Emulation (5)
1-29 of 29 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.