Adversary-Simulation-Toolkit

๐Ÿš€ Overview

Adversary Simulation Toolkit is a comprehensive collection of utilities and resources designed for red teaming, adversary emulation, and security research. This repository serves as a centralized hub for tools, use cases, and documentation to facilitate realistic threat simulation.

๐Ÿง  Concepts

What is Adversary Emulation? Adversary emulation leverages adversary tactics, techniques, and procedures (TTPs), enhanced by cyber threat intelligence, to create a security test based on real-world intrusion campaigns. It helps organizations prioritize threats and verify defenses against specific actors.

Adversary Emulation Plan To showcase the practical use of ATT&CK, MITRE created Adversary Emulation Plans. These documents outline how to model adversary behavior based on open threat reports, allowing defenders to test their networks against specific APT TTPs rather than just generic vulnerabilities.

๐Ÿ—บ๏ธ Attack Navigator

Visualize and plan your adversary emulation scenarios using the MITRE ATT&CK Navigator.

๐Ÿ› ๏ธ Tools by Phase

This toolkit organizes tools according to the standard Red Team phases, enriched with resources from the community.

0. Adversary Simulation Platforms

Automated and manual platforms for mimicking adversary behavior.

1. Reconnaissance

Gathering intelligence on the target.

Active Intelligence Gathering

Passive Intelligence Gathering

Frameworks

2. Weaponization

Coupling a remote access trojan with an exploit.

3. Delivery

Transmitting the weapon to the target environment.

Phishing

Watering Hole Attack

4. Command and Control (C2)

Establishing a command channel.

Remote Access Tools

Staging & Infrastructure

Simulation C2 Frameworks C2s specifically designed or well-suited for adversary simulation and research.

5. Lateral Movement

Moving through the environment.

6. Establish Foothold

Maintaining access.

7. Escalate Privileges

Gaining higher-level permissions.

Domain Escalation

Local Escalation

8. Data Exfiltration

Stealing data.

9. Misc

Other useful tools.

Wireless Networks

Embedded & Peripheral Devices

Team Communication

Log Aggregation

C# Offensive Framework

Labs

Scripts


๐Ÿ“‚ Local Tools Directory

The Tools directory in this repository contains essential binaries, scripts, and archives organized by phase:

๐Ÿ› ๏ธ Root Tools

๐Ÿ•ต๏ธ Reconnaissance

โš”๏ธ Weaponization & Privilege Escalation

Contains various post-exploitation and privilege escalation tools, including:

๐Ÿ“ก Command and Control (C2)

๐Ÿ—‚๏ธ Resources

Templates and guides for planning and executing adversary emulations.

๐Ÿ“š Use Cases

Explore the Use Case directory for detailed simulation plans and scenarios.

Ransomware & Cybercrime

State-Sponsored APTs Comprehensive simulation plans for major nation-state actors.

๐Ÿ“š References & Learning Resources

Curated list of blogs, videos, and guides for advanced techniques.

Privilege Escalation

Lateral Movement

Command and Control (Tutorials)

Defense Evasion (AV/EDR)

๐Ÿ“ฆ Installation & Usage

  1. Clone the repository:
    git clone https://github.com/hrtywhy/Adversary-Simulation-Toolkit.git
    
  2. Navigate to the directory:
    cd Adversary-Simulation-Toolkit
    
  3. Explore the Tools and Use Case directories for specific resources.

๐Ÿค Contribution

Contributions are welcome! Please submit a pull request or open an issue to suggest new tools or simulation scenarios.

โš ๏ธ Disclaimer

This toolkit is intended for educational and authorized security testing purposes only. The authors are not responsible for any misuse of these tools. Always obtain proper authorization before conducting any security assessments.