11/12 free views
Documentation
Other
Threat Intelligence

adversary_emulation_library

by center-for-threat-informed-defense

2.0Kstars
347forks
147watchers
Updated 8 months ago
About

An open library of adversary emulation plans enabling organizations to test and improve their defenses based on real-world attacker behaviors and tactics.

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

Primary Use Case

This tool is used by security teams, especially red teams and threat hunters, to simulate realistic adversary behaviors and evaluate their defensive capabilities against known threat actor tactics. Organizations leverage these emulation plans to prioritize and strengthen their security posture through practical, scenario-based testing and training.

Key Features
  • Comprehensive full adversary emulation plans covering end-to-end attack scenarios
  • Focused micro emulation plans targeting specific adversary behaviors or techniques
  • Alignment with MITRE ATT&CK framework tactics and techniques
  • Plans based on real-world threat actor intelligence and behaviors
  • Supports red teaming, threat hunting, and security training exercises
  • Open and community-driven library maintained by the MITRE Center for Threat-Informed Defense
  • Detailed intelligence summaries accompanying each adversary emulation plan
Security Frameworks
Initial Access
Execution
Persistence
Privilege Escalation
Exfiltration
Usage Insights
  • Integrate adversary emulation plans with blue team detection tools to validate alerting and response capabilities.
  • Use micro emulation plans for targeted training sessions to improve specific defensive skills.
  • Leverage the library to build realistic purple team exercises that enhance collaboration between red and blue teams.
  • Automate execution of emulation plans in test environments to continuously assess security posture.
  • Combine with threat intelligence feeds to tailor emulation plans to evolving adversary behaviors.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about adversary_emulation_library. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team90%
Blue Team40%
Purple Team80%
Details
LicenseApache License 2.0
LanguageC
Open Issues77
Topics
ctid
cybersecurity
threat-informed-defense
mitre-attack
red-team
cyber-threat-intelligence
adversary-emulation
adversary-emulation-plans