-
Hello there,
it was already stated in issue https://github.com/center-for-threat-informed-defense/adversary_emulation_library/issues/84 and in [this comment](https://github.com/mitre/emu/issues/18#…
-
https://fight.mitre.org/
FiGHT™ (5G Hierarchy of Threats), is a knowledge base of adversary Tactics and Techniques for 5G systems. FiGHT consists of three types of Techniques: theoretical, proof of…
-
Hello there,
I'm currently trying to reproduce the APT29 Scenario 1 in local and noticed that the dependencies on the attacker platform (192.168.0.4) aren't pinned.
This is quite troublesome as …
-
Pretty sure this one is broken after some updates(?) -- we recently put some cycles towards fixing but might be lost/in need of a redesign 🤕
For now, a more straightforward/graceful approach availabl…
-
Several issues have been uncovered in several of the steps outlined in: [Setup-RedTeam.md](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/master/turla/Resources…
-
-
Hi @iknowjason ,
as per the lab (_Microsoft Sentinel lab with AD, deployed with terraform. Adds logging best practices with Sysmon_.) demonstration PurpleSharp tool is supposed to be available in t…
-
Within the adversary emulation library, there are many links between markdown files and verifying them is a manual process.
Acceptance Criteria:
1. A CI check that walks the repository and checks …
-
@ryan-detect-dot-dev
-
The current implementation of the runner, adds the current test's GUID to the hostname, and then uses that GUID to know where in the execution schedule it is to continue running.
**The Order Colum…