Skip to content

Latest commit

 

History

History
63 lines (45 loc) · 2.05 KB

README.md

File metadata and controls

63 lines (45 loc) · 2.05 KB

APT Attack Simulation

This repository is a compilation of all Russian, Chinese, Iranian and North Koreans APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here. I relied on Palo Alto Networks Unit 42, Kaspersky, Microsoft, Cisco, Trellix, CrowdStrike and WithSecure to figure out the details to make this simulations.

photo_2024-09-07_20-05-46

Caution

It's essential to note that this project is for educational and research purposes only, and any unauthorized use of it could lead to legal consequences.

These are all the names of the APT groups, and I simulated one attack for each group.

RUSSIA🇷🇺️

  1. Cozy Bear APT29 ✅️
  2. Fancy Bear APT28 ✅️
  3. Energetic Bear ✅️
  4. Berserk Bear ✅️
  5. Gossamer Bear ✅️
  6. Voodoo Bear APT44 ✅️
  7. Ember Bear ✅️
  8. Venomous Bear ✅️
  9. Primitive Bear ✅️

To be continued...

China🇨🇳️

  1. Mustang Panda ✅️
  2. Wicked Panda APT41
  3. Goblin Panda
  4. Anchor Panda
  5. Deep Panda
  6. Samurai Panda
  7. Phantom Panda
  8. Sunrise Panda
  9. Ethereal Panda

North Korea🇰🇵️

  1. Labyrinth Chollima ✅️
  2. Stardust Chollima
  3. Silent Chollima
  4. Ricochet Chollima
  5. Velvet Chollima
  6. Famous Chollima

Iran🇮🇷️

  1. Helix Kitten
  2. Clever Kitten
  3. Static Kitten
  4. Tracer Kitten
  5. Nemesis Kitten
  6. Spectral Kitten

All of this adversary simulation is powered by Bear-C2. https://github.com/S3N4T0R-0X0/BEAR imageedit_4_5482104706

Disclaimer: This is for research, awareness, and educational purposes, I am not responsible if anyone uses this technique for illegal purposes.