Home {% for plugin in plugins %} {% if plugin.address %} {{ plugin.name }} {% endif %} {% endfor %}
Docs Logout

CALDERA

Cyber Adversary Language and Decision Engine for Red Team Automation

I am a blue-teamer

As a blue-team operator, you should start by deploying one or many 54ndc47 (Sandcat) agents on remote computers you want to test. Then move into Chain mode to create adversary profiles and run operations against the deployed hosts.

I am a researcher

As a researcher, you should restart the server with the mock plugin, which deploys simulated agents. Then, go into Chain mode and run a few sample operations. Once familiar with how abilities link together, study the sequential.py module in the source code, which contains the automated decision-making logic.

I am a red-teamer

As a red-team operator, you should restart the server with the terminal plugin loaded. Then, deploy one or many 54ndc47 (Sandcat) agents on remote computers. Use the terminal to create and join reverse-shell sessions to manually compromise the hosts.




LOADED PLUGINS

{% for plugin in plugins %} {% endfor %}
{{ plugin.name }} {{ plugin.description }}