summaryrefslogtreecommitdiff
path: root/security/caldera/files (follow)
Commit message (Collapse)AuthorAgeFilesLines
* security/caldera: Update to 5.2.0Jose Alonso Cardenas Marquez2025-03-051-15/+0
| | | | ChangeLog at: https://github.com/mitre/caldera/releases
* security/caldera: Improve portJose Alonso Cardenas Marquez2024-03-262-5/+62
| | | | | | | | | | | - Improve rc script. Now it kills some child processes - Use my new atomic-red-team repository. It include a new entry run_as into yaml files for identify FreeBSD tests easily because oficial redcanaryco/atomic-red-team project included new changes and these remove freebsd entries from yaml files because it was merged into linux tests. Now identify what are FreeBSD tests is almost imposible. - Some other minor modifications - Bump PORTREVISION
* security/caldera: Update to 5.0.0Jose Alonso Cardenas Marquez2024-02-179-61/+239
| | | | ChangeLog at: https://github.com/mitre/caldera/releases/tag/5.0.0
* security/caldera: Update to 4.2.0Jose Alonso Cardenas Marquez2023-06-211-2/+2
| | | | ChangeLog at: https://github.com/mitre/caldera/releases/tag/4.2.0
* security/caldera: Fix permission issues with some payload directoriesJose Alonso Cardenas Marquez2023-06-023-2/+14
| | | | | | | | - Fix a problem in ragdoll payload - Add GOCACHE and GOMODCACHE to caldera_env into caldera rc script. It is useful for avoid issues when some payloads are compiled - Some other modifications - Bump PORTREVISION
* security/caldera: Use caldera user and group into port filesJose Alonso Cardenas Marquez2023-05-103-13/+40
| | | | | | | | | | - Update caldera rc file - Update pkg-plist file - Atomic plugin was patched for download yaml from alonsobsd/atomic-red-team instead of redcanaryco/atomic-red-team github repository until my pull request will be approved - Add/modify entries into pkg-message file - Bump PORTREVISION
* security/caldera: New port: Automated Adversary Emulation PlatformJose Alonso Cardenas Marquez2023-04-29108-0/+1673
CALDERA a cyber security platform designed to easily automate adversary emulation, assist manual red-teams, and automate incident response. It is built on the MITRE ATT&CK framework and is an active research project at MITRE. The framework consists of two components: - The core system. This is the framework code, consisting of what is available in this repository. Included is an asynchronous command-and-control (C2) server with a REST API and a web interface. - Plugins. These repositories expand the core framework capabilities and providing additional functionality. Examples include agents, reporting, collections of TTPs and more.