Science Score: 44.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
    Found CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
    Found .zenodo.json file
  • DOI references
  • Academic publication links
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (12.2%) to scientific vocabulary
Last synced: 6 months ago · JSON representation ·

Repository

Basic Info
  • Host: GitHub
  • Owner: JuanesVelandia
  • License: apache-2.0
  • Language: Python
  • Default Branch: main
  • Size: 21.6 MB
Statistics
  • Stars: 0
  • Watchers: 1
  • Forks: 0
  • Open Issues: 0
  • Releases: 0
Created almost 2 years ago · Last pushed over 1 year ago
Metadata Files
Readme Contributing License Citation Codeowners Security

README.md

Release Testing Status Security Status codecov Documentation Status

MITRE Caldera™

MITRE Caldera™ is a cyber security platform designed to easily automate adversary emulation, assist manual red-teams, and automate incident response.

It is built on the MITRE ATT&CK™ framework and is an active research project at MITRE.

The framework consists of two components:

1) The core system. This is the framework code, consisting of what is available in this repository. Included is an asynchronous command-and-control (C2) server with a REST API and a web interface. 2) Plugins. These repositories expand the core framework capabilities and providing additional functionality. Examples include agents, reporting, collections of TTPs and more.

Resources and Socials

Plugins

:star: Create your own plugin! Plugin generator: Skeleton :star:

Default

These plugins are supported and maintained by the Caldera team. - Access (red team initial access tools and techniques) - Atomic (Atomic Red Team project TTPs) - Builder (dynamically compile payloads) - Caldera for OT (ICS/OT capabilities for Caldera) - Compass (ATT&CK visualizations) - Debrief (operations insights) - Emu (CTID emulation plans) - Fieldmanual (documentation) - GameBoard (visualize joint red and blue operations) - Human (create simulated noise on an endpoint) - Manx (shell functionality and reverse shell payloads) - Response (incident response) - Sandcat (default agent) - SSL (enable https for caldera) - Stockpile (technique and profile storehouse) - Training (certification and training course)

More

These plugins are ready to use but are not included by default and are not maintained by the Caldera team. - Arsenal (MITRE ATLAS techniques and profiles) - CalTack (embedded ATT&CK website) - Pathfinder (vulnerability scanning) - SAML (SAML authentication)

Requirements

These requirements are for the computer running the core framework:

  • Any Linux or MacOS
  • Python 3.8+ (with Pip3)
  • Recommended hardware to run on is 8GB+ RAM and 2+ CPUs
  • Recommended: GoLang 1.17+ to dynamically compile GoLang-based agents.

Installation

Concise installation steps: Bash git clone https://github.com/mitre/caldera.git --recursive cd caldera pip3 install -r requirements.txt python3 server.py --insecure

Full steps: Start by cloning this repository recursively, passing the desired version/release in x.x.x format. This will pull in all available plugins. Bash git clone https://github.com/mitre/caldera.git --recursive --branch x.x.x

Next, install the PIP requirements: Bash pip3 install -r requirements.txt Super-power your Caldera server installation! Install GoLang (1.19+)

Finally, start the server. Bash python3 server.py --insecure

Once started, log into http://localhost:8888 using the default credentials red/admin. Then go into Plugins -> Training and complete the capture-the-flag style training course to learn how to use Caldera.

Docker Deployment

To build a Caldera docker image, ensure you have docker installed and perform the following actions: ```Bash

Recursively clone the Caldera repository if you have not done so

git clone https://github.com/mitre/caldera.git --recursive

Build the docker image. Change image tagging as desired.

WIN_BUILD is set to true to allow Caldera installation to compile windows-based agents.

Alternatively, you can use the docker compose YML file via "docker-compose build"

cd caldera docker build . --build-arg WIN_BUILD=true -t caldera:latest

Run the image. Change port forwarding configuration as desired.

docker run -p 8888:8888 caldera:latest ```

To gracefully terminate your docker container, do the following: ```Bash

Find the container ID for your docker container running Caldera

docker ps

Send interrupt signal, e.g. "docker kill --signal=SIGINT 5b9220dd9c0f"

docker kill --signal=SIGINT [container ID] ```

Contributing

Refer to our contributor documentation.

Vulnerability Disclosures

Refer to our vulnerability discolosure documentation for submitting bugs.

Licensing

To discuss licensing opportunities, please reach out to caldera@mitre.org or directly to MITRE's Technology Transfer Office.

Caldera Benefactor Program

If you are interested in partnering to support, sustain, and evolve Caldera™'s open source capabilities, please contact us at caldera@mitre.org.

Owner

  • Login: JuanesVelandia
  • Kind: user

Citation (CITATION.cff)

cff-version: 1.2.0
message: "If you use this software, please cite it as below."
authors:
- name: "MITRE Corporation"
title: "MITRE Caldera: A Scalable, Automated Adversary Emulation Platform"
version: 4.2.0
date-released: 2023-06-19
url: "https://github.com/mitre/caldera"

GitHub Events

Total
Last Year

Dependencies

.github/workflows/greetings.yml actions
  • actions/first-interaction 1d8459ca65b335265f1285568221e229d45a995e composite
.github/workflows/publish_docker_image.yml actions
  • actions/checkout b4ffde65f46336ab88eb53be808477a3936bae11 composite
  • docker/build-push-action 2eb1c1961a95fc15694676618e422e8ba1d63825 composite
  • docker/login-action 465a07811f14bebb1938fbed4728c6a1ff8901fc composite
  • docker/metadata-action 818d4b7b91585d195f67373fd9cb0332e31a7175 composite
.github/workflows/quality.yml actions
  • SonarSource/sonarcloud-github-action 5875562561d22a34be0c657405578705a169af6c composite
  • actions/checkout c85c95e3d7251135ab7dc9ce3241c5835cc595a9 composite
  • actions/setup-python 3542bca2639a428e1796aaa6a2ffef0c0f575566 composite
.github/workflows/security.yml actions
  • actions/checkout c85c95e3d7251135ab7dc9ce3241c5835cc595a9 composite
  • actions/setup-python 3542bca2639a428e1796aaa6a2ffef0c0f575566 composite
.github/workflows/stale.yml actions
  • actions/stale a20b814fb01b71def3bd6f56e7494d667ddf28da composite
Dockerfile docker
  • ubuntu 23.04 build
docker-compose.yml docker
  • caldera latest
package-lock.json npm
  • 305 dependencies
package.json npm
  • eslint ^8.50.0 development
  • eslint-config-airbnb-base ^15.0.0 development
  • eslint-plugin-html ^6.2.0 development
  • eslint-plugin-import ^2.28.1 development
  • eslint-plugin-jinja2 ^0.1.0 development
  • stylelint ^15.10.3 development
  • stylelint-config-standard ^24.0.0 development
requirements-dev.txt pypi
  • bandit * development
  • coverage * development
  • dnspython ==2.1.0 development
  • pre-commit * development
  • pytest * development
  • pytest-aiohttp ==1.0.3 development
  • safety * development
  • tox * development
requirements.txt pypi
  • Markdown ==3.4.4
  • Sphinx ==7.1.2
  • aioftp *
  • aiohttp ==3.8.5
  • aiohttp-apispec ==2.2.3
  • aiohttp-jinja2 ==1.5.1
  • aiohttp-security ==0.4.0
  • aiohttp_session ==2.12.0
  • asyncssh ==2.13.2
  • cryptography ==41.0.4
  • dirhash ==0.2.1
  • dnspython ==2.4.2
  • donut-shellcode ==1.0.2
  • jinja2 ==3.1.2
  • ldap3 ==2.9.1
  • lxml *
  • marshmallow ==3.20.1
  • marshmallow-enum ==1.5.1
  • myst-parser ==2.0.0
  • pyyaml ==6.0.1
  • reportlab ==4.0.4
  • sphinx_rtd_theme ==1.3.0
  • svglib ==1.5.1
  • websockets ==11.0.3