atomic-red-team
APTSimulator
atomic-red-team | APTSimulator | |
---|---|---|
32 | 7 | |
9,079 | 2,373 | |
1.6% | 1.1% | |
9.7 | 0.0 | |
4 days ago | 11 months ago | |
C | Batchfile | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
atomic-red-team
-
Which Antivirus do you recommend and why?
You can write your own or look at testing tools like Cytest to ensure that your business goals are met and to ensure your sensors are configured correctly, and ART for attack chains.
-
Exfiltration Detections
I had heard that Falcon Overwatch has a detection for Exfiltration for C2, but I was not able to trigger it using my personal Kali Machine to host a C2 server with https://github.com/cedowens/SimpleC2_Server and then used Atomic Red Team: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1041/T1041.md
- EDR Attack Simulation
-
Red Team Methodology
Yup what the above said, you can use atomic red https://github.com/redcanaryco/atomic-red-team
-
“Malicious” powershell commands for demo
Atomic red team have tests that should trigger it, it also has a clear description of what it does and how to clean up afterwards. https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1059.001/T1059.001.md suggest that you try obfuscation or cradle.
-
Initial acess simulation tests
Dated but still full of goodness. https://github.com/redcanaryco/atomic-red-team/tree/e88a1ea463964839e267dba74ec1cf7bf634ccbf/ARTifacts/Initial_Access
-
What are some good showcases of Collection-tactics of the MITRE ATT&CK matrix?
Are you familiar with Atomic Red Team? Many quick & practical sample tests you can often run without much effort or prep work. All tests map to Techniques - a quick way to search through them all at the Tactic level is by searching within the CSV index of all their current tests here (I counted ~50 Collection-related tests just now): https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Indexes/Indexes-CSV/index.csv
-
Testing an XDR solution
Check out Atomic Red Team’s Redcanary.
- Blue Teamers: What makes a good detection use case?
- Custom IOAs: What's The Best Resource/Documentation For This On CS Falcon
APTSimulator
-
Lack of Detections
APTSim is also a common choice (https://github.com/NextronSystems/APTSimulator)
-
EDR Attack Simulation
https://github.com/NextronSystems/APTSimulator is another common choice for this.
- how worthless is windows defender after all?
-
If you could name 5 tools/software worth learning for a cybersecurity analyst to become more employable, what would they be?
https://github.com/NextronSystems/APTSimulator APT Simulator is a Windows Batch script that uses a set of tools and output files to make a system look as if it was compromised. In contrast to other adversary simulation tools, APT Simulator is designed to make the application as simple as possible. You don't need to run a web server, database or any agents on set of virtual machines. Just download the prepared archive, extract and run the contained Batch file as Administrator. Running APT Simulator takes less than a minute of your time.
- Bulk Extractor showing Explicit Websites
- How to keep a SOC on their toes
-
APTSimulator 0.9.0 featuring Cobalt Strike beacon activity simulation
Here’s the direct link: https://github.com/NextronSystems/APTSimulator
What are some alternatives?
detection-rules - Rules for Elastic Security's detection engine
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
sigma - Main Sigma Rule Repository
monkey - Infection Monkey - An open-source adversary emulation platform
BLUESPAWN - An Active Defense and EDR software to empower Blue Teams
EDR-Telemetry - This project aims to compare and evaluate the telemetry of various EDR products.
sysmon-modular - A repository of sysmon configuration modules
invoke-atomicredteam - Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Red Team project.
Incident-Playbook - GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
Notes
public-pentesting-reports - A list of public penetration test reports published by several consulting firms and academic security groups.
ransomware-simulator - Ransomware simulator written in Golang