-
Hello everyone,
I just found this repository, after working with the [adversary emulation library of the CTID](https://github.com/center-for-threat-informed-defense/adversary_emulation_library) for…
-
### Contribution Description
Hi, I am trying to emulate Turla Snake Day 2. I compile snake drivers and installer also compiled EPIC payload to connect my control server. EPIC payload successfully con…
-
Hello there,
it was already stated in issue https://github.com/center-for-threat-informed-defense/adversary_emulation_library/issues/84 and in [this comment](https://github.com/mitre/emu/issues/18#…
-
Hello there,
I'm currently trying to reproduce the APT29 Scenario 1 in local and noticed that the dependencies on the attacker platform (192.168.0.4) aren't pinned.
This is quite troublesome as …
-
Hi,
We have been using the Oilrig scenario for a few months now, and have noticed that some of our runs fail because the controlServer/agent is unreliable. Last example in date, the upload of plink…
-
Several issues have been uncovered in several of the steps outlined in: [Setup-RedTeam.md](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/master/turla/Resources…
-
Pretty sure this one is broken after some updates(?) -- we recently put some cycles towards fixing but might be lost/in need of a redesign 🤕
For now, a more straightforward/graceful approach availabl…
-
@ryan-detect-dot-dev
-
Within the adversary emulation library, there are many links between markdown files and verifying them is a manual process.
Acceptance Criteria:
1. A CI check that walks the repository and checks …
-