Open‑Source Breach & Attack Simulation Tools: CALDERA, Infection Monkey, Atomic Red Team

This article reviews seventeen open‑source security validation tools covering breach and attack simulation, cloud, endpoint, WAF, traffic detection, and adversary emulation, summarizing each tool's features, deployment steps, use‑case scenarios, strengths, and limitations for both red‑team and blue‑team operations.

Huolala Tech
Huolala Tech
Huolala Tech
Open‑Source Breach & Attack Simulation Tools: CALDERA, Infection Monkey, Atomic Red Team

Introduction

Before internal security validation, a collection of seventeen open‑source security validation tools (covering BAS, cloud, endpoint, WAF, traffic detection, and adversary simulation) was gathered and tested. The evaluation focused on three aspects: test case library, execution/control, and data collection/analysis.

Breach and Attack Simulation (BAS)

BAS validates the capabilities of existing defense mechanisms by simulating real attacks against network systems.

CALDERA (Highly Mature)

CALDERA™ is a MITRE‑ATT&CK‑based platform that automates adversary emulation, assists manual red‑team activities, and supports automated incident response.

Basic Information

Frequent updates, high completeness, API integration.

Agent‑Server architecture with plugin extensibility.

Core framework includes a REST API and web‑based C2 server.

Key Components

CAMPAIGNS – Agents : Sandcat (Go), Manx (Go reverse shell), Ragdoll (Python).

Abilities : ATT&CK techniques implemented as commands, customizable.

Adversaries : Collections of abilities representing threat actors.

Operations : Control execution of adversaries on selected agents.

Plugins

Access, Atomic, Compass, Debrief, Fieldmanual, Manx, Sandcat, Stockpile, Training.

Configuration

Fact Sources, Objectives, Planners, Contacts, Obfuscators, Exfilled Files.

Typical Use Cases

Autonomous Red‑Team Participation : Deploy agents, select an adversary, and run an operation to test defenses.

Autonomous Incident Response (Blue Team) : Deploy blue agents, select a defender profile, and execute response operations.

Manual Red‑Team Participation : Use the Manx agent to run manual commands during assessments.

Infection Monkey 1.13 (Ransomware Simulation)

Infection Monkey simulates lateral movement and ransomware behavior across data‑center environments. It consists of a Monkey agent (Go/Python) and an Island server providing a GUI.

Features include easy installation, support for containers, public and private clouds, and detailed security reports (Infection Map, Security Report, Zero Trust Report, ATT&CK Report, Ransomware Report).

Atomic Red Team

Atomic Red Team™ is a community‑maintained library of ATT&CK‑mapped test cases that can be executed directly from the command line or via frameworks such as Invoke‑AtomicRedTeam.

Invoke‑AtomicRedTeam

A PowerShell module that imports and runs Atomic Red Team test cases, requiring PowerShell Core and providing commands to list, execute, and clean up tests.

ARTi‑c2

An ATOMIC‑based C2 framework; installation issues are noted, but it can be experimented with.

Purple Team ATT&CK Automation (MSF)

A set of Metasploit modules implementing ATT&CK techniques; last updated in 2020.

Metta (Legacy)

Uber’s Python‑based adversary simulation framework using Redis/Celery and Vagrant; no longer maintained.

RTA (Legacy)

Python‑2 scripts that emulate ATT&CK techniques for testing detection capabilities.

Cloud Security Validation

Stratus Red Team (AWS)

Simulates ATT&CK techniques in AWS environments using API calls; requires AWS credentials.

AWS‑Attack (Pacu Fork)

Modified Pacu framework that adds ATT&CK context to AWS exploitation scenarios.

Endpoint Detection and Response

Chain Reactor

Generates Linux executables from JSON‑defined reaction scripts to test detection coverage.

Web Application Firewall (WAF) Testing

Gotestwaf

Go‑based tool that tests API and OWASP attacks against WAFs, providing reports.

waf‑bypass

Python tool that checks WAF false‑positive/negative rates using predefined payloads.

go‑ftw

Go implementation of the FTW framework for testing WAF rule sets against the OWASP CRS.

Wafbench

Performance testing tool (similar to ab) with components for normal testing, WAF performance, and FTW‑compatible testing.

Traffic Detection

flightsim

Generates malicious network traffic (DNS tunneling, DGA, C2) to evaluate IDS/IPS visibility.

Egress‑Assess

Tests data exfiltration detection across multiple protocols (FTP, SMTP, HTTP, SMB, DNS, etc.).

Adversary Simulation Libraries

Community‑threats and the Center for Threat‑Informed Defense’s adversary_emulation_library provide extensive, continuously updated threat‑actor playbooks in various formats (Markdown, JSON, MITRE ATT&CK Navigator).

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

BASAdversary simulationAtomic Red TeamCALDERAInfection MonkeyWAF testing
Huolala Tech
Written by

Huolala Tech

Technology reshapes logistics

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.