A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files.
☆73Oct 14, 2021Updated 4 years ago
Alternatives and similar repositories for atomiccaldera
Users that are interested in atomiccaldera are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A CALDERA plugin☆75Mar 17, 2026Updated last week
- Repository for my ATT&CK analysis research.☆70May 16, 2019Updated 6 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- Splunk Technology Add-On (TA) for collecting ETW events from Windows systems☆17Dec 8, 2022Updated 3 years ago
- Scripts and integrations for OSSEC☆41Mar 18, 2016Updated 10 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆60May 25, 2020Updated 5 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- ☆20Dec 8, 2018Updated 7 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- A CALDERA plugin☆81Updated this week
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 9 months ago
- SMB Named Pipe shell☆69Nov 19, 2024Updated last year
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆240Jul 22, 2021Updated 4 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Sep 14, 2023Updated 2 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆170Sep 27, 2022Updated 3 years ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- Invoke-LiveResponse☆150Feb 22, 2022Updated 4 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- ☆1,090May 1, 2019Updated 6 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Sep 4, 2018Updated 7 years ago
- EventList☆377Mar 21, 2021Updated 5 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Understanding ATT&CK Matrix for Enterprise☆79May 16, 2018Updated 7 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- electron-updater DigitalOcean example (DigitalOcean Spaces)☆10Jan 6, 2023Updated 3 years ago
- Splunk app for Threat hunting☆15Nov 15, 2018Updated 7 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Automated Adversary Emulation Platform☆6,831Updated this week