Penetration testing commands for Adversary Simulation

Adversary simulation focuses on emulating real-world cyber threat actors to evaluate an organisation’s detection, prevention, and response capabilities. This category includes tools and methodologies to replicate various attack scenarios in a controlled and effective manner.

NameDescriptionPrice
Adversary Emulation LibraryA library of adversary emulation plans to allow organizations to evaluate their defensive capabilities against the real-world threats they faceFree
Atomic Red TeamA library of tests mapped to the MITRE ATT&CK® framework used to quickly, portably, and reproducibly test their environmentsFree
CalderaCyber security platform designed to easily automate adversary emulation, assist manual red-teams, and automate incident responseFree
Infection MonkeyAdversary emulation platform; test a data center's resiliency to perimeter breaches and internal server infectionFree
Invoke-ApexPowerShell-based toolkit consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasksFree
ManticoreAdversary emulation command line tool is parsing complex scenarios from Manticore public-threats repository and run these scenariosFree
MITRE ATT&CK DefenderATT&CK training and certification program produced by MITRE’s own ATT&CK subject matter expertsFree
SliverCross-platform adversary emulation/red team framework used by organizations of all sizes to perform security testingFree
Stratus Red TeamStratus Red Team is 'Atomic Red Team' for the cloud, allowing to emulate offensive attack techniques in a granular and self-contained mannerFree