Penetration testing commands for Adversary Simulation
Adversary simulation focuses on emulating real-world cyber threat actors to evaluate an organisation’s detection, prevention, and response capabilities. This category includes tools and methodologies to replicate various attack scenarios in a controlled and effective manner.
Name | Description | Price |
---|---|---|
Adversary Emulation Library | A library of adversary emulation plans to allow organizations to evaluate their defensive capabilities against the real-world threats they face | Free |
Atomic Red Team | A library of tests mapped to the MITRE ATT&CK® framework used to quickly, portably, and reproducibly test their environments | Free |
Caldera | Cyber security platform designed to easily automate adversary emulation, assist manual red-teams, and automate incident response | Free |
Infection Monkey | Adversary emulation platform; test a data center's resiliency to perimeter breaches and internal server infection | Free |
Invoke-Apex | PowerShell-based toolkit consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks | Free |
Manticore | Adversary emulation command line tool is parsing complex scenarios from Manticore public-threats repository and run these scenarios | Free |
MITRE ATT&CK Defender | ATT&CK training and certification program produced by MITRE’s own ATT&CK subject matter experts | Free |
Sliver | Cross-platform adversary emulation/red team framework used by organizations of all sizes to perform security testing | Free |
Stratus Red Team | Stratus Red Team is 'Atomic Red Team' for the cloud, allowing to emulate offensive attack techniques in a granular and self-contained manner | Free |