Attackers are always finding new methods to bypass execution prevention controls allowing them to execute code or commands without alerting or generating logs.

Execution Modules

Execution modules refer to when an attacker is attempting to execute code or commands on a system. This could be done in a way to bypass certain restrictions, executing priviledged commands and hiding malicious activity. ATTACKIFY provides a number of execution modules such as:

  • Command execution through mis-configured system settings
  • User Account Control bypass execution
  • PowerShell exectuion
  • Command execution by vulnerable apps
  • MacOS XPC Executions
  • Memory Loading Executions
  • DyLib Injections
  • Office Macro Executions
  • Execution Protection Bypasses

Related Modules


These modules are based off individual APT tactics, techniques and procedures to assist security teams in identifying suspicious activity usually seen in advanced persistent attackers.

more info


Simulate numerous exploit techniques as used by attackers & malware to inject into processes, elevate privileges or impersonate users. Modules are designed to emulate core functionality without potwntially damaging systems.

more info

Security Controls

Validate endpoint security controls and perform a number of compliance checks to ensure systems are securely configured.

more info