stockpile icon indicating copy to clipboard operation
stockpile copied to clipboard

A CALDERA plugin

Results 14 stockpile issues
Sort by recently updated
recently updated
newest added

## Description This merge will add a cleaned up version of the previously closed source guided planner. Numerous changes have been made to the closed source version, most of which...

## Description The Worm adversary profile attempts to copy a file to an admin share without mounting the share. This PR adds the Net Use ability to Worm to mount...

bug

**Describe the bug** When running an operation using the new guided planner and enabling the debug attack graph output, the conditional matplotlib.pyplot import in [line 232 of the guided planner](https://github.com/mitre/stockpile/blob/master/app/guided.py#L232)...

bug

## Description Added missing matplotlib dependency to `requirements.txt`. The dependency is used in the debug method of guided planner. Closes #557 ## Type of change Please delete options that are...

…s 10 ## Description Previous caesar cipher obfuscator did not work for unix systems running sh (rather than bash) within sandcat (which seems to be the default), and for both...

good first issue
great bug fix

## Description This is a initial support for FreeBSD ## Type of change - [X] New feature (non-breaking change which adds functionality) ## How Has This Been Tested? Please describe...

## Description Created 2 new persistence abilities utilizing cron jobs ## Type of change Please delete options that are not relevant. - [ ] New feature (non-breaking change which adds...

## Description Added two linux privilege escalation abilities and a payload ## Type of change - [x] New feature (non-breaking change which adds functionality) ## How Has This Been Tested?...

## Description - Found correct uuids for adversary and its associated abilities based on commented ability names. ### Warnings: ### Disable iptables: - Correct ID should be `76f6af088510618953265cefe9bb54e0` ### Execute...

## Description This ability leverages DLL hijacking to establish persistence by executing arbitrary code to deploy an agent. The ability involves the following steps: - Downloads the portable version of...