11/12 free views
Framework
Framework
Penetration Testing & Red Teaming

caldera

by mitre

6.7Kstars
1.3Kforks
183watchers
Updated 3 months ago
About

MITRE Caldera is an automated adversary emulation platform that enables red teams and incident responders to simulate cyber attacks and automate security operations based on the MITRE ATT&CK framework.

Automated Adversary Emulation Platform

Primary Use Case

Caldera is primarily used by red teams, penetration testers, and incident response teams to emulate adversary behaviors, test defenses, and automate security workflows. It helps organizations validate their security posture and improve detection and response capabilities by simulating realistic attack scenarios.

Key Features
  • Asynchronous command-and-control (C2) server with REST API and web interface
  • Built on the MITRE ATT&CK framework for adversary emulation
  • Extensible via plugins to add agents, reporting, TTP collections, and more
  • Supports automation of red team operations and incident response
  • Includes default plugins for initial access, payload building, incident response, and visualization
  • Provides training resources, tutorials, and documentation
  • Active research project with ongoing development and community engagement
  • Supports ICS/OT capabilities through dedicated plugins

Installation

  • Clone the repository from https://github.com/mitre/caldera
  • Install required dependencies as per the documentation at https://caldera.readthedocs.io/en/latest/
  • Run the core system which includes the asynchronous C2 server
  • Access the web interface to interact with the platform
  • Optionally install and enable plugins to extend functionality

Usage

>_ Start the Caldera server

Launches the asynchronous command-and-control server with REST API and web interface

>_ Use the web interface

Interact with Caldera’s features including adversary emulation, operation management, and reporting

>_ Install plugins like Access, Atomic, or Response

Extend the core framework with additional capabilities such as initial access tools, atomic red team TTPs, and incident response automation

Security Frameworks
Initial Access
Execution
Persistence
Defense Evasion
Command and Control
Usage Insights
  • Integrate Caldera with SIEM tools to automate detection validation and tuning.
  • Use Caldera’s plugin architecture to customize adversary emulations for industry-specific threats.
  • Leverage Caldera in purple team exercises to improve collaboration between red and blue teams.
  • Automate continuous security posture assessments by scheduling regular Caldera attack simulations.
  • Combine Caldera with threat intelligence feeds to dynamically update TTPs and enhance realism.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about caldera. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team90%
Blue Team50%
Purple Team80%
Details
LicenseApache License 2.0
LanguagePython
Open Issues840
Topics
adversary-emulation
caldera
security-automation
red-team
mitre
mitre-attack
security-testing
mitre-corporation
cybersecurity
hacking