Emulation

Emulate the adversary.

asset-count

Adversary

Organization Description Directory
Al-Khaser Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection. last-commit opensource
Caldera Scalable Automated Adversary Emulation Platform. last-commit opensource
DumpsterFire A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. last-commit opensource
Silver Adversary Emulation Framework. last-commit opensource