Each `Txxxx/` folder aligns with a [MITRE ATT&CK®](https://attack.mitre.org/) technique (e.g., `T1008 - Fallback Channels`).
## 📚 Purpose
These tests serve to:
- Simulate realistic adversary techniques for purple teaming
- Validate and tune detections in platforms like Microsoft Sentinel
- Encourage learning through hands-on scripting and modular design
## 🛠 Getting Started
To run a test:
-
Clone this repository
-
Ensure Atomic Red Team and
Invoke-AtomicTestare installed -
COmmands to show a custom test's details locally:
Invoke-AtomicTest Txxxx -PathToAtomicsFolder "Path\To\Custom_RedTeam_Scripts\Txxxx" -ShowDetails
Or, if the main folder is installed within the Home directory on Linux/Debian
Invoke-AtomicTest Txxxx -ShowDetails
✍️ Authorship & Intent
Every test is written with clarity, ethics, and realism in mind—crafted for defenders, educators, and explorers of cyber capability. Inspired by adversaries, grounded in empathy. If you build upon these, keep the spirit of transparency, curiosity, and community alive.
© 2025 Chris Carucci (a.k.a. GITSGHOST) 🛰 “Even in fallback, we signal.”