mitre-atlas / caldera-atlas
☆11Updated last year
Alternatives and similar repositories for caldera-atlas:
Users that are interested in caldera-atlas are comparing it to the libraries listed below
- CALDERA plugin for adversary emulation of AI-enabled systems☆95Updated last year
- source code for the offsecml framework☆38Updated 10 months ago
- ☆39Updated 4 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆93Updated last year
- NOVA: The Prompt Pattern Matching☆60Updated 2 weeks ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆20Updated this week
- ☆87Updated 2 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- A CALDERA plugin☆26Updated 9 months ago
- ☆104Updated 10 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆52Updated last month
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆16Updated 9 months ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated last month
- A fun POC that is built to understand AI security agents.☆30Updated 4 months ago
- ☆36Updated 3 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated last month
- OWASP Foundation Web Respository☆9Updated 2 weeks ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 4 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆107Updated 6 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆37Updated last month
- ☆15Updated 2 weeks ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆27Updated last year
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 6 months ago
- ☆47Updated last week
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆88Updated last year
- ATLAS tactics, techniques, and case studies data☆64Updated this week
- Augmentation to Machine Readable CTI☆31Updated last month
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆59Updated last week