Table 1 Comparative analysis of existing adversary emulation Frameworks.

From: A data-driven approach to prioritize MITRE ATT&CK techniques for active directory adversary emulation

Study

Methodological Focus

Integration of

MITRE ATT&CK

Relevance to AD

Technique Prioritization

Emulation Fidelity

11

Network interaction simulation

None

Low

Not applicable

Abstracted (session-based)

14

Attack documentation/replication

Explicit mapping to TTPs

Conditional

Not applicable

Medium

10

Automated post-compromise emulation

Full ATT&CK TTP library

High

Implicit via goal planning

High

2

Endpoint defense evaluation under stealth constraints

ATT&CK-aligned TTP execution

High

Implicit by evasion logic

High

13

Evasion-focused low-level emulation

Direct TTP injection

Moderate

Not applicable

High

9

Objective-driven multi-path attack planning

Derived from ATT&CK objectives

Moderate

Implicit (goal-to-TTP compilation)

Medium