attack-arsenal icon indicating copy to clipboard operation
attack-arsenal copied to clipboard

A collection of red team and adversary emulation resources developed and released by MITRE.

Results 5 attack-arsenal issues
Sort by recently updated
recently updated
newest added

Hey there, I'm currently integrating CALDERA (including this plugin) into another framework I'm working on, which basically simulates a small company network. Everything works out so far, but one question...

Hi, I was trying to follow the installation steps given to reproduce the APT 29 attack. I'm currently on a MacOS BigSur version 11.2.1 and running a zsh shell, although...

First off, probably not the most appropriate place to post this question: I understand that this repository is targeted at APT29 (which is also pointed out at https://github.com/mitre-attack/attack-arsenal/issues/24). However, 1....

According to the `Full` profile of APT3 [here](https://github.com/mitre-attack/attack-arsenal/blob/master/adversary_emulation/APT29/CALDERA_DIY/evals/data/adversaries/ef93dd1b-809b-4a0b-b686-fef549cabbe4.yml), the 19 phases are executed in one-shot. When adding an Operation to run this particular profile, we start off with the initial...