ATTACKIFY





These modules are based off individual APT tactics, techniques and procedures to assist security teams in identifying suspicious activity usually seen in advanced persistent attackers.

APT Modules

ATTACKIFY has a large library of individualized attack modules based off the TACTICS, TECHNIQUES and PROCEDURES seen in APT threat actors. You can refine detection and improve monitoring abilities by continuosly running modules over and over.

Some of these modules include tactics, techniques and procedures of the following:

  • Pass the Hash
  • Alternate Data Stream Files
  • COM+ Services LSASS Memory Dump
  • Screen Capture
  • BITS Jobs Code Persistence
  • RDP Session Hijacking
  • Sticky Keys Privileged Persistence
  • Copy Clipboard Data
  • Process Hollowing

Related Modules

Exfiltration

Exfiltration modules allow you to discover various techniques that can be used to exfiltrate sensitive data from within the organization to external C2's. Discover which services, ports and protcols can bypass your DLP solutions.

more info

Ransomware

Select from a number of modules to simulate ransomware behaviour on endpoints and communication over networks.

more info

Security Controls

Validate endpoint security controls and perform a number of compliance checks to ensure systems are securely configured.

more info