Skip to content
This repository was archived by the owner on Apr 20, 2026. It is now read-only.

secwexen/attack-simulator-framework

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

128 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Attack Simulator Framework

status

About

Attack Simulator Framework is a modular, MITRE ATT&CK–aligned adversary simulation framework that empowers Red Teams, Purple Teams, and security engineers to test and enhance enterprise security defenses. It simulates realistic attack chains on Windows and Linux environments, providing actionable insights through structured reports.

Features

  • Full MITRE ATT&CK–aligned tactics and techniques
  • Modular and extensible technique architecture
  • Windows & Linux technique support
  • YAML-based attack profiles
  • Automatic reporting (JSON + Markdown)
  • Logging and behavioral tracking hooks

Architecture

The framework is built around three core components:

1. Core Engine

  • Loads and executes attack techniques
  • Manages execution flow
  • Generates structured reports

2. Techniques Module

  • Each MITRE ATT&CK technique is implemented as an independent module
  • Easy to extend and customize
  • Supports multiple platforms

3. Attack Profiles

  • YAML files define attack chains
  • Example: Discovery → Persistence → Lateral Movement

Project Structure

attack-simulator-framework/
│
├── src/
│   ├── core/
│   │   ├── executor.py
│   │   ├── technique_loader.py
│   │   └── report_generator.py
│   │
│   ├── techniques/
│   │   ├── discovery/
│   │   │   └── T1087_list_users.py
│   │   ├── persistence/
│   │   │   └── T1053_scheduled_tasks.py
│   │   └── lateral_movement/
│   │       └── T1021_remote_services.py
│   │
│   ├── utils/
│   │   ├── logger.py
│   │   ├── system_checks.py
│   │   └── platform_detection.py
│   │
│   └── main.py
│
├── configs/
│   ├── attack_profile_example.yaml
│   └── technique_mapping.json
│
├── reports/
│   └── (auto-generated reports)
│
├── tests/
│   ├── test_executor.py
│   ├── test_techniques.py
│   └── test_utils.py
│
├── CODE_OF_CONDUCT.md
├── LICENSE
├── README.md
├── SECURITY.md
└── requirements.txt

Installation

Requirements

  • Python 3.11+
  • pip 23+

Quick Start

# Clone repository
git clone https://github.com/secwexen/attack-simulator-framework.git
cd attack-simulator-framework

# Create virtual environment
python -m venv venv
source venv/bin/activate  # Linux/Mac
venv\Scripts\activate     # Windows

# Install dependencies
pip install -r requirements.txt

# Install dev dependencies
pip install -r dev-requirements.txt

Usage

CLI Options

--profile Specify attack profile YAML file to execute
--verbose Enable detailed logging
--dry-run Simulate attacks without executing actions

Run an attack profile:

python src/main.py --profile configs/attack_profile_example.yaml

Disclaimer

This tool is intended for authorized security testing, research, and educational purposes only. Unauthorized use against systems without explicit permission is illegal and strictly prohibited. The authors are not responsible for misuse.

License

Copyright © 2026 secwexen.

This project is licensed under the Apache-2.0 License.
See the LICENSE file for full details.

Author

Secwexen – Project Lead & Maintainer
GitHub: https://github.com/secwexen

About

This repository is archived and is no longer actively maintained.

Topics

Resources

License

Stars

Watchers

Forks

Languages