Skip to content
This repository was archived by the owner on Feb 10, 2026. It is now read-only.

L1quidDroid/caldera

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4,529 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

📦 ARCHIVE NOTICE

This repository is archived and no longer actively maintained.

This is a snapshot of MITRE Caldera v5.0.0 (Triskele Labs Enhanced) as of February 10, 2026.
It includes custom orchestration features (Phases 1-6) developed for multi-environment campaign
management, webhook integration, and PDF reporting capabilities.

For the actively maintained MITRE Caldera project:

This archived version includes:

  • Global orchestration pattern for campaign management
  • Dynamic agent enrollment REST API
  • ELK Stack integration with webhook publishing
  • PDF reporting with ATT&CK Navigator visualisations
  • Azure deployment templates (Bicep IaC)

The code is provided as-is for reference purposes. No updates, bug fixes, or support
will be provided. Issues and pull requests are disabled.


Release Documentation Status

MITRE Caldera™

MITRE Caldera™ is a cyber security platform designed to easily automate adversary emulation, assist manual red-teams, and automate incident response.

It is built on the MITRE ATT&CK™ framework and is an active research project at MITRE.

The framework consists of two components:

  1. The core system. This is the framework code, consisting of what is available in this repository. Included is an asynchronous command-and-control (C2) server with a REST API and a web interface.
  2. Plugins. These repositories expand the core framework capabilities and providing additional functionality. Examples include agents, reporting, collections of TTPs and more.

Quick Start Flowchart

flowchart TD
    A[Install CALDERA] --> B{Run Setup Check}
    B -->|Pass| C[Start Server]
    B -->|Fail| D[Fix Dependencies]
    D --> B
    C --> E[Access Web UI]
    E --> F[Deploy Agent]
    F --> G[Create Operation]
    G --> H[Execute & Monitor]
    H --> I[Review Results]
    
    style A fill:#e1f5ff
    style C fill:#d4edda
    style G fill:#fff3cd
    style I fill:#d1ecf1
Loading

Resources & Socials

Plugins

⭐ Create your own plugin! Plugin generator: Skeleton

Default

These plugins are supported and maintained by the Caldera team.

  • Access (red team initial access tools and techniques)

  • Atomic (Atomic Red Team project TTPs)

  • Builder (dynamically compile payloads)

  • Caldera for OT (ICS/OT capabilities for Caldera)

  • Compass (ATT&CK visualizations)

  • Debrief (operations insights)

  • Emu (CTID emulation plans)

  • Fieldmanual (documentation)

  • GameBoard (visualize joint red and blue operations)

  • Human (create simulated noise on an endpoint)

  • Magma (VueJS UI for Caldera v5)

  • Manx (shell functionality and reverse shell payloads)

  • Response (incident response)

  • Sandcat (default agent)

  • SSL (enable https for caldera)

  • Stockpile (technique and profile storehouse)

  • Training (certification and training course)

Custom Enhancements (Triskele Labs)

  • Enrollment (Dynamic agent enrollment REST API for CI/CD integration)
  • Orchestrator (Webhook publisher and SIEM integration)
  • Sequencer (Campaign sequencing and operation chaining)
  • Branding (Custom UI theming for Triskele Labs)

See ORCHESTRATION_GUIDE.md for implementation details.

More

These plugins are ready to use but are not included by default and are not maintained by the Caldera team.

Requirements

These requirements are for the computer running the core framework:

  • Any Linux or MacOS
    • Python 3.10+ (with Pip3)
  • Recommended hardware to run on is 8GB+ RAM and 2+ CPUs
  • Recommended: GoLang 1.24+ to dynamically compile GoLang-based agents.
  • NodeJS (v16+ recommended for v5 VueJS UI)

Installation

Note: we HIGHLY recommend installing Caldera in a Python virtual environment to avoid issues with pip packages. You can use an existing environment if you wish or create a new one from scratch:

python3 -m venv .calderavenv
source .calderavenv/bin/activate

Concise installation steps:

git clone https://github.com/mitre/caldera.git --recursive
cd caldera
pip3 install -r requirements.txt
python3 server.py --insecure --build

Full steps: Start by cloning this repository recursively, passing the desired version/release in x.x.x format. This will pull in all available plugins.

git clone https://github.com/mitre/caldera.git --recursive --tag x.x.x

Next, install the PIP requirements:

pip3 install -r requirements.txt

Finally, start the server.

python3 server.py --insecure --build

The --build flag automatically installs any VueJS UI dependencies, bundles the UI into a dist directory and is served by the Caldera server. You will only have to use the --build flag again if you add any plugins or make any changes to the UI. Once started, log into http://localhost:8888 using the default credentials red/admin. Then go into Plugins -> Training and complete the capture-the-flag style training course to learn how to use Caldera.

If you prefer to not use the new VueJS UI, revert to Caldera v4.2.0. Correspondingly, do not use the --build flag for earlier versions as not required.

Additionally, please note security recommendations for deploying Caldera.

Docker Installation

Local build:

git clone https://github.com/mitre/caldera.git --recursive
cd caldera
docker build --build-arg VARIANT=full -t caldera .
docker run -it -p 8888:8888 caldera

Adjust the port forwarding (-p) and build args (--build-arg) as desired. The ports exposed depend on which contacts you plan on using (see Dockerfile and docker-compose.yml for reference).

Security

The Caldera team highly recommends standing up the Caldera server on a secure environment/network, and not exposing it to the internet. The Caldera server does not have a hardened and thoroughly pentested web application interface, but only basic authentication and security features. Both MITRE and MITRE's US Government sponsors nearly exclusively only use Caldera on secure environments and do not rely on Caldera's own security protocols for proper cyber security.

Vulnerability Disclosures

Refer to our Vulnerability Disclosure Documentation for submitting bugs.

Recent Vulnerability Disclosures

🚨Security Notice🚨: (17 Feb 2025 10:00 EST) Please pull v5.1.0+ for a recent security patch for CVE-2025-27364. Please update your Caldera instance, especially if you host Caldera on a publicly accessible network. Vulnerability walkthrough.

Licensing

To discuss licensing opportunities, please reach out to caldera@mitre.org or directly to MITRE's Technology Transfer Office.

About

Automated Adversary Emulation Platform

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 105