-
Hello there,
it was already stated in issue https://github.com/center-for-threat-informed-defense/adversary_emulation_library/issues/84 and in [this comment](https://github.com/mitre/emu/issues/18#…
-
https://fight.mitre.org/
FiGHT™ (5G Hierarchy of Threats), is a knowledge base of adversary Tactics and Techniques for 5G systems. FiGHT consists of three types of Techniques: theoretical, proof of…
-
Hello there,
I'm currently trying to reproduce the APT29 Scenario 1 in local and noticed that the dependencies on the attacker platform (192.168.0.4) aren't pinned.
This is quite troublesome as …
-
Pretty sure this one is broken after some updates(?) -- we recently put some cycles towards fixing but might be lost/in need of a redesign 🤕
For now, a more straightforward/graceful approach availabl…
-
Several issues have been uncovered in several of the steps outlined in: [Setup-RedTeam.md](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/master/turla/Resources…
-
-
Hi @iknowjason ,
as per the lab (_Microsoft Sentinel lab with AD, deployed with terraform. Adds logging best practices with Sysmon_.) demonstration PurpleSharp tool is supposed to be available in t…
-
1.GPPA is Retired.
https://www.giac.org/retired-certifications/
2.GPYC's classify
SANS previously classified SEC573(GPYC's course) as "Specialized Penetration Testing"(current "Specialized Offens…
-
Within the adversary emulation library, there are many links between markdown files and verifying them is a manual process.
Acceptance Criteria:
1. A CI check that walks the repository and checks …
-
@ryan-detect-dot-dev