-
According to the `Full` profile of APT3 [here](https://github.com/mitre-attack/attack-arsenal/blob/master/adversary_emulation/APT29/CALDERA_DIY/evals/data/adversaries/ef93dd1b-809b-4a0b-b686-fef549cab…
-
Provide the following - we'll add more when we can
**Project scope**
- macOS focus
- Ocean Lotus + Red Team Operation
- hunting focus
- contribute [simuLand](https://github.co…
-
In the APT29 yaml file, at line 1749, command of T1105 is missing below the "executors" tag :
line 1746 executors:
line 1747 - name: powershell
line 1748 command: |
line 1749
line 1750…
-
I'm testing some adversary emulation on Caldera and I'm using Sandcat as the agent to deploy operations. I have this ability with just an executable called Backstab and it runs fine both locally and w…
-
## To register, companies must meet the following criteria:
* Deliver cybersecurity products or services, category definitions can be [found here](categories.md)
* Hold a valid Australian Business…
-
1.GPPA is Retired.
https://www.giac.org/retired-certifications/
2.GPYC's classify
SANS previously classified SEC573(GPYC's course) as "Specialized Penetration Testing"(current "Specialized Offens…
-
**Describe the bug**
When I install de emu plugin in caldera, caldera says that it can't find the payloads asociated to the emu's adversaries
**To Reproduce**
Steps to reproduce the behavior:
1. …
-
# Description
Finally, the attacker launches a PowerShell script that performs a wide variety of reconnaissance commands (T1083, T1033, T1082, T1016, T1057, T1063, T1069), some of which are done by…
-
**Describe the bug**
Fact requirements are not respected for custom abilities on v 5.0.0.
This is based on the requirement definition, structured after https://caldera.readthedocs.io/en/latest/Re…
-
In this system, the interest groups are available to the user. That means a competing advertiser B has direct access to specific elements of the marketing strategy of advertiser A. This may already be…