Technology

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.


Tooling

• Open source only capabilities (tools, vulns, exploits, c2’s)

• Custom tools and scripts • Automation/validation of TTP’s and blue controls • Automated infrastructure deployment • Automated logging from attack infrastructure

• Custom C2 and implant capabilities • 0 or N-day exploit capabilities  • Automated reporting capabilities • Ability to adapt technology maturity based on threat actor emulation and organizational needs

Labs

• Manual infrastructure • Manual logging

• Wiki/Knowledge Base with runbooks for common TTP’s • Internal source code repository for shared code, tools, and script

• Lab with target environment tech/security stack • Automated lab deployment