Automata
caldera_pathfinder
Automata | caldera_pathfinder | |
---|---|---|
1 | 3 | |
48 | 118 | |
- | 4.2% | |
2.3 | 3.3 | |
4 months ago | 26 days ago | |
Python | Python | |
GNU Affero General Public License v3.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Automata
caldera_pathfinder
- Attack simulation tool based on CVE
-
Attack Chain/Exploitation Path Diagram Generation Tools?
There's also a plugin for Caldera (https://github.com/mitre/caldera) called Pathfinder (https://github.com/center-for-threat-informed-defense/caldera_pathfinder and https://www.youtube.com/watch?v=gQRWkHFRG-s) that can help.
-
Guidance on certs in Cybersecurity Field
Pathfinder: https://github.com/center-for-threat-informed-defense/caldera_pathfinder
What are some alternatives?
Zircolite - A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
Covenant - Covenant is a collaborative .NET C2 framework for red teamers.
labelImg - LabelImg is now part of the Label Studio community. The popular image annotation tool created by Tzutalin is no longer actively being developed, but you can check out Label Studio, the open source data labeling tool for images, text, hypertext, audio, video and time-series data.
Starkiller - Starkiller is a Frontend for PowerShell Empire.
dj-stripe - dj-stripe automatically syncs your Stripe Data to your local database as pre-implemented Django Models allowing you to use the Django ORM, in your code, to work with the data making it easier and faster.
caldera - Automated Adversary Emulation Platform
security_content - Splunk Security Content
attack-flow - Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
tram - TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
bzar - A set of Zeek scripts to detect ATT&CK techniques.
attack-control-framework-mappings - 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
Empire - Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.