Tag Archives: Adversarial Tactics
Mordor – Re-play Adversarial Techniques
The Mordor project provides pre-recorded security events generated by simulated adversarial techniques in the form of JavaScript Object Notation (JSON) files for easy consumption.
METTA – Information Security Preparedness Tool
Security monitoring is becoming more and more complex. This is because of the various type of application and system we use. Today each application or protocol we should have the correct security device and system to analyze and inspect required