Enter Title



What is MAPL? 

Imagine a malware training platform that uses authentic, real-world operational malware in a persistent environment. A platform with flexible, scripted scenarios and campaigns, requiring only trainers and cyberwarriors for the exercise. Even better, a platform available at no cost to your organization. And, a platform that lives in the Air Force’s very own Home of the Hacker squadron. With this platform, what training scenarios could your team(s) explore?

MAPL (Malicious Playground) is the solution to your malware training needs. MAPL enables re-runnable,  customizable, and loggable cyber security training within a single platform. It offers an easy, compact, and turn-key solution. Its the premier PEMR (Persistent Environment for Malware Replication) of the 90th Cyberspace Operations Squadron, designed to support your malware training.

Part of the MAPL magic is that it is easy to setup, support and use. For setup, MAPL combines a Malware control program, an automation and logging tool from MITRE called Caldera, and a suite of customizable plugins rolled into a few setup files. Additionally, MAPL is unclassified and can reside on a variety of networks. So unclassified, in fact, that the malware control component is available to the general public here: https://gitlab.com/90cos/mcp and Caldera resides here: https://caldera.mitre.org/

For support, as an unclassified USAF-maintained platform, it is available without expense to any other USAF unit or other cooperating organizations. This includes demos, setup support, first time user training and scenarios, customization of MAPL and plugins, and ‘last mile’ support.

Finally, the fun of using MAPL is the learning and discovering best practice(s) with MAPL on real life, neutered, acting-as-it-would in the real world, malware. MAPL generates the ‘Ah-ha’ moments. In short, MAPL is the learn-by-doing and -practicing platform, and engenders better learning/retention than CBTs, class or presentations alone.