ATTACKIFY modules can be summarised in the the following categories, however we are always adding new relevant modules from the latest attacker TTPs and feeding our research back into modules and constantly improving attack scenarios.
Exfiltration modules allow you to discover various techniques that can be used to exfiltrate sensitive data from within the organization to external C2's. Discover which services, ports and protcols can bypass your DLP solutions.
Simulate numerous exploit techniques as used by attackers & malware to inject into processes, elevate privileges or impersonate users. Modules are designed to emulate core functionality without potwntially damaging systems.