Adversary Emulation Library Logo

Adversary Emulation Library

0
Free
Visit Website

In collaboration with Center Participants, the Center for Threat-Informed Defense (Center) maintains a library of adversary emulation plans to allow organizations to evaluate their defensive capabilities against real-world threats. Emulation plans are an essential component in testing current defenses for organizations that are looking to prioritize their defenses around actual adversary behavior. The library contains two types of adversary emulation plans: full emulation and micro emulation. Full emulation plans are a comprehensive approach to emulating a specific adversary, e.g. FIN6, from initial access to exfiltration. These plans emulate a wide range of ATT&CK tactics & techniques and are designed to emulate a real breach from the designated adversary. Micro emulation plans are a focused approach to emulating compound behaviors seen across multiple adversaries, e.g. webshells.

FEATURES

ALTERNATIVES

Repository of IOCs provided under the Apache 2.0 license

A set of rules for detecting threats in various formats, including Snort, Yara, ClamAV, and HXIOC.

A digital risk protection platform that combines threat intelligence, dark web monitoring, attack surface management, brand protection, and supply chain intelligence to detect and respond to external cyber threats.

Open Source Threat Intelligence Collector with plugin-oriented framework.

TIH is an intelligence tool that helps you search for IOCs across multiple security feeds and APIs.

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

A collection of YARA rules for research and hunting purposes.

Sigma is a generic and open signature format for SIEM systems and other security tools to detect and respond to threats.