ENNAENNA

CALDERA

Apache-2.0

๐Ÿ”ฅ Offensive Ops ยท Python

CALDERA is MITRE's open-source adversary emulation platform that automates attack simulations based on the ATT&CK framework. It enables red teams and purple teams to run realistic, repeatable attack chains against their infrastructure without manually executing each technique. CALDERA uses an agent-based architecture where lightweight agents (called Sandcat) are deployed on target systems and execute adversary profiles โ€” curated sequences of ATT&CK techniques that mimic real-world threat actors. The platform includes dozens of pre-built abilities covering reconnaissance, credential access, lateral movement, persistence, and exfiltration. Blue teams can use CALDERA to validate detection coverage by running known attack sequences and checking whether their SIEM, EDR, and monitoring tools triggered appropriate alerts. The web-based UI provides real-time visibility into operation progress and a reporting engine for gap analysis.

6.9kstars
1.3kforks
65issues
Updated 22d ago
+I use this

Use Cases

  • Automated adversary emulation using ATT&CK techniques
  • Purple team exercises and detection validation
  • Security control gap analysis

Tags

adversary-emulationmitre-attackred-teamautomationcalderacybersecurityhackinghacktoberfestmitremitre-corporationsecurity-automationsecurity-testing

Community Reviews

More in Offensive Ops