Infection Monkey - An open-source adversary emulation platform
-
Updated
May 1, 2025 - Python
Infection Monkey - An open-source adversary emulation platform
Automated Adversary Emulation Platform
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Open Adversary Exposure Validation Platform
Utilities for MITRE™ ATT&CK
Tool for building Kubernetes attack paths
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).
Go shellcode loader that combines multiple evasion techniques
indirect syscalls for AV/EDR evasion in Go assembly
MITRE Caldera™ for OT Plugins & Capabilities
Repo containing cracked red teaming tools.
The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Add a description, image, and links to the adversary-emulation topic page so that developers can more easily learn about it.
To associate your repository with the adversary-emulation topic, visit your repo's landing page and select "manage topics."