Simulate numerous exploit techniques as used by attackers & malware to inject into processes, elevate privileges or impersonate users. Modules are designed to emulate core functionality without potwntially damaging systems.
ATTACKIFY has a number of exploit modules that have been designed to run as safe as possible within environments. Exploit modules include priviledge escalation, process injection, various anti-malware bypass techniques. The modules are designed to execute on an endpoint in a safe way that would allow security teams to discover malicious behaviour, suspicious processes and potential short falls of currently deployed security products.
Some of the modules in ATTACKIFY include:
Great care is taken to test modules in multiple scenarios and configurations but it will always come with a warning platform running these in a production setting, so maybe dont do production (: