attack-arsenal
attack-arsenal copied to clipboard
A collection of red team and adversary emulation resources developed and released by MITRE.
Hey there, I'm currently integrating CALDERA (including this plugin) into another framework I'm working on, which basically simulates a small company network. Everything works out so far, but one question...
Hi, I was trying to follow the installation steps given to reproduce the APT 29 attack. I'm currently on a MacOS BigSur version 11.2.1 and running a zsh shell, although...
First off, probably not the most appropriate place to post this question: I understand that this repository is targeted at APT29 (which is also pointed out at https://github.com/mitre-attack/attack-arsenal/issues/24). However, 1....
According to the `Full` profile of APT3 [here](https://github.com/mitre-attack/attack-arsenal/blob/master/adversary_emulation/APT29/CALDERA_DIY/evals/data/adversaries/ef93dd1b-809b-4a0b-b686-fef549cabbe4.yml), the 19 phases are executed in one-shot. When adding an Operation to run this particular profile, we start off with the initial...