Skip to content

This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.

Notifications You must be signed in to change notification settings

EclipseX270/APT-Attack-Simulation

 
 

Repository files navigation

APT Attack Simulation

This repository is a compilation of all Russian, Chinese, Iranian and North Koreans APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here. I relied on Palo Alto Networks Unit 42, Kaspersky, Microsoft, Cisco, Trellix, CrowdStrike and WithSecure to figure out the details to make this simulations.

photo_2024-09-07_20-05-46

Caution

It's essential to note that this project is for educational and research purposes only, and any unauthorized use of it could lead to legal consequences.

These are all the names of the APT groups, and I simulated one attack for each group.

RUSSIA🇷🇺️

  1. Cozy Bear APT29 ✅️
  2. Fancy Bear APT28 ✅️
  3. Energetic Bear ✅️
  4. Berserk Bear ✅️
  5. Gossamer Bear ✅️
  6. Voodoo Bear APT44 ✅️
  7. Ember Bear ✅️
  8. Venomous Bear ✅️
  9. Primitive Bear ✅️

To be continued...

China🇨🇳️

  1. Mustang Panda ✅️
  2. Wicked Panda APT41
  3. Goblin Panda
  4. Anchor Panda
  5. Deep Panda
  6. Samurai Panda
  7. Phantom Panda
  8. Sunrise Panda
  9. Ethereal Panda

North Korea🇰🇵️

  1. Labyrinth Chollima ✅️
  2. Stardust Chollima
  3. Silent Chollima
  4. Ricochet Chollima
  5. Velvet Chollima
  6. Famous Chollima

Iran🇮🇷️

  1. Helix Kitten
  2. Clever Kitten
  3. Static Kitten
  4. Tracer Kitten
  5. Nemesis Kitten
  6. Spectral Kitten

All of this adversary simulation is powered by Bear-C2. https://github.com/S3N4T0R-0X0/BEAR imageedit_4_5482104706

Disclaimer: This is for research, awareness, and educational purposes, I am not responsible if anyone uses this technique for illegal purposes.

About

This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 32.9%
  • C++ 23.8%
  • C 11.0%
  • PHP 7.4%
  • Ruby 6.3%
  • Perl 3.9%
  • Other 14.7%