A CALDERA plugin
☆18Jul 28, 2020Updated 5 years ago
Alternatives and similar repositories for adversary
Users that are interested in adversary are comparing it to the libraries listed below
Sorting:
- ☆20Dec 19, 2017Updated 8 years ago
- A CALDERA plugin☆74Feb 16, 2026Updated 2 weeks ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 6 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Dec 14, 2025Updated 2 months ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 2 months ago
- Experimental CPSA -- the Cryptographic Protocol Shapes Analyzer experimental version☆21Sep 24, 2025Updated 5 months ago
- A CALDERA plugin☆81Feb 17, 2026Updated 2 weeks ago
- A dashboard framework for visualizing complex data sets on T1V multi-panel displays☆22Jan 4, 2023Updated 3 years ago
- ☆19Oct 30, 2020Updated 5 years ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Oct 21, 2025Updated 4 months ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- ☆12Feb 18, 2026Updated last week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆59Nov 22, 2019Updated 6 years ago
- Simple DLL injector written in C#☆24Sep 28, 2015Updated 10 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆31Apr 26, 2024Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- ☆31May 24, 2019Updated 6 years ago
- Cryptographic Protocol Shapes Analyzer☆37Oct 4, 2022Updated 3 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Oct 7, 2025Updated 4 months ago
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- ☆13Mar 4, 2017Updated 9 years ago
- [TPAMI 2022] Disentangling Light Fields for Super-Resolution and Disparity Estimation☆13Apr 2, 2024Updated last year
- EPICS support for multi-channel analyzers (MCA) and multi-channel scalers (MCS).☆12Aug 25, 2025Updated 6 months ago
- An extensible component for detecting cosmetic contact lenses in iris imagery.☆10Jun 25, 2025Updated 8 months ago
- Draft and review content for MoJ IT Policy.☆11Sep 2, 2020Updated 5 years ago
- Simple Socket Protocol for Embedded Systems☆12Dec 12, 2025Updated 2 months ago
- Context Hub Runtime Environment (CHRE)☆10Oct 17, 2023Updated 2 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Feb 5, 2022Updated 4 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Apr 18, 2013Updated 12 years ago
- [DEPRICATED] Project won't be continued.☆10Jul 31, 2023Updated 2 years ago
- A flying and rock-shooting game☆17Oct 14, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- This is the code for "Neural Network Reconstruction of Plasma Space-Time" by C.Bard and J.Dorelli (DOI: 10.3389/fspas.2021.732275). It is…☆13Oct 6, 2021Updated 4 years ago
- ☆12Feb 16, 2023Updated 3 years ago
- An EPICS areaDetector driver for CCD detectors from Andor Technology using Version 2 of the Andor Software Development Kit (SDK).☆10Dec 17, 2025Updated 2 months ago
- ☆13Sep 12, 2025Updated 5 months ago