
We're releasing a library of adversary emulation plans that translates real threat actor behavior into working tools for security testing.
Per threat actor:
v1.0 target: 30+ techniques across 3 threat actors
Technique selection prioritizes emulation safety, detection value, and operational realism. Not all publicly reported techniques are emulated.
Open source. Works with your existing tools.
Most adversary emulation research is behind paywalls or scattered across vendor blogs. We wanted something practical that security teams could use without buying a platform or stitching together fragments.
This is what we needed when setting up purple team operations.
Starting with three diverse threat actors:
| Threat Actor | Type | Focus | Why It Matters |
|---|---|---|---|
| Lazarus Group | APT | Crypto/Finance | Financially motivated, well-documented cross-platform TTPs |
| APT29 | APT | Gov/Tech | SolarWinds actor, cloud-native and supply chain techniques |
| LockBit | Ransomware | All sectors | Most active ransomware, ESXi targeting |
Nation-state APTs and ransomware. Broad enough for most security teams.
Research → Document → Build → Test → Release
What gets released:
threat-actor-name/ ├── caldera/abilities/ # Ready to import ├── detection-rules/sigma/ # Tested rules ├── atomic-red-team/ # Test cases ├── docs/ # Full documentation └── iocs.json # Sanitized indicators
Open source. No licensing. Works with your tools. Learn the techniques, don't just run them.
Community contributions welcome.
Hosted on GitHub at Secure-Origin.
Ways to contribute:
Write-ups published as each actor completes.
Currently researching Lazarus Group's Linux and Windows TTPs.
First release includes:
Follow for updates.


