AdversaryEmulation
caldera_pathfinder
AdversaryEmulation | caldera_pathfinder | |
---|---|---|
1 | 3 | |
99 | 118 | |
- | 4.2% | |
0.0 | 3.3 | |
about 1 year ago | 22 days ago | |
Python | Python | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
AdversaryEmulation
caldera_pathfinder
- Attack simulation tool based on CVE
-
Attack Chain/Exploitation Path Diagram Generation Tools?
There's also a plugin for Caldera (https://github.com/mitre/caldera) called Pathfinder (https://github.com/center-for-threat-informed-defense/caldera_pathfinder and https://www.youtube.com/watch?v=gQRWkHFRG-s) that can help.
-
Guidance on certs in Cybersecurity Field
Pathfinder: https://github.com/center-for-threat-informed-defense/caldera_pathfinder
What are some alternatives?
seed-labs - SEED Labs developed in the last 20 years.
Covenant - Covenant is a collaborative .NET C2 framework for red teamers.
hackthebox - Notes Taken for HTB Machines & InfoSec Community.
Starkiller - Starkiller is a Frontend for PowerShell Empire.
caldera - Automated Adversary Emulation Platform
SecGen - Create randomly insecure VMs
attack-flow - Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
tram - TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Automata - Automatic detection engineering technical state compliance
bzar - A set of Zeek scripts to detect ATT&CK techniques.
attack-control-framework-mappings - 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.