Skip to content

This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and other malicious artifacts that mirror those used in real world attacks .

License

Notifications You must be signed in to change notification settings

S3N4T0R-0X0/APTs-Adversary-Simulation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

APTs Adversary Simulation

A comprehensive collection of simulated Advanced Persistent Threat (APT) attacks based on real world tactics, techniques, and procedures (TTPs) used by state sponsored APT Groups from Russia, China, Iran, and North Korea

imageedit_1_3882451879

Caution

Important Notice: This project is strictly for educational, research, and defensive security purposes only. Unauthorized use of these techniques may violate laws and result in serious legal consequences.

🧠 Overview

This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, command and control (C2) servers, backdoors, exploitation techniques, stagers, bootloaders, and other malicious artifacts that mirror those used in real-world attacks. The simulations are based on extensive research from leading cybersecurity firms, including Palo Alto Unit 42, Kaspersky, Microsoft, Cisco, Trellix, CrowdStrike, and WithSecure.

Learn More About the Importance and Outcomes of the Experience:

🎯 Simulated APT Groups

The naming convention for APT groups follows CrowdStrike's taxonomy.

photo_2025-11-09_04-26-38

Below is the complete list of simulated APT Groups:

Country of Origin Russia 🇷🇺 China 🇨🇳 North Korea 🇰🇵 Iran 🇮🇷
APT Groups Cozy Bear ✅
Voodoo Bear ✅
Fancy Bear ✅
Energetic Bear ✅
Berserk Bear ✅
Gossamer Bear ✅
Primitive Bear ✅
Ember Bear ✅
Venomous Bear ✅
Mustang Panda ✅
Glacial Panda
Wicked Panda ✅
Goblin Panda
Anchor Panda
Deep Panda
Samurai Panda
Phantom Panda
Sunrise Panda
Ethereal Panda
Labyrinth Chollima ✅
Velvet Chollima ✅
Famous Chollima ✅
Stardust Chollima ✅
Ricochet Chollima ✅
Silent Chollima ✅
Helix Kitten
Pioneer Kitten
Clever Kitten
Static Kitten
Tracer Kitten
Nemesis Kitten
Charming Kitten
Pulsar Kitten
Remix Kitten

🛠️ Technical Framework

All adversary simulations are powered by BEAR-C2, a custom command and control framework designed for realistic threat emulation.

Bear-C2 Framework

Always Remember: "Be The Threat To Defeat It"

📫 Contact

Telegram     Twitter/X     LinkedIn     Reddit

TelegramTwitter/XLinkedInReddit

About

This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and other malicious artifacts that mirror those used in real world attacks .

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published