Tag Archives: Adversarial Tactics

Mordor – Re-play Adversarial Techniques

The Mordor project provides pre-recorded security events generated by simulated adversarial techniques in the form of JavaScript Object Notation (JSON) files for easy consumption.

METTA – Information Security Preparedness Tool

Security monitoring is becoming more and more complex. This is because of the various type of application and system we use. Today each application or protocol we should have the correct security device and system to analyze and inspect required