Security research and open-source tools for defenders.
We build adversary emulation plans, detection rules, and threat intelligence that work across Linux, Windows, and cloud environments. Our research informs the CTEM platform we build commercially.
We release:
- Adversary emulation plans and Caldera abilities
- Detection rules
- Threat intelligence feeds and OCSF transforms
- Validation frameworks and security tooling
All projects released under MIT/Apache 2.0 licenses.