Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
• Open source only capabilities (tools, vulns, exploits, c2’s)
• Custom tools and scripts • Automation/validation of TTP’s and blue controls • Automated infrastructure deployment • Automated logging from attack infrastructure
• Custom C2 and implant capabilities • 0 or N-day exploit capabilities • Automated reporting capabilities • Ability to adapt technology maturity based on threat actor emulation and organizational needs
• Manual infrastructure • Manual logging
• Wiki/Knowledge Base with runbooks for common TTP’s • Internal source code repository for shared code, tools, and script
• Lab with target environment tech/security stack • Automated lab deployment