red-team-tactics

Installation
Summary

Red team simulation framework based on MITRE ATT&CK phases and adversary tactics.

  • Covers 12 attack phases from reconnaissance through impact, with objectives and techniques for each stage
  • Includes specific guidance for privilege escalation, defense evasion, lateral movement, and Active Directory attacks on Windows and Linux targets
  • Provides reconnaissance principles, initial access vectors, credential harvesting methods, and C2 operational security practices
  • Emphasizes detection evasion techniques, reporting requirements, and ethical boundaries to ensure scoped, non-destructive simulations
SKILL.md

AUTHORIZED USE ONLY: Use this skill only for authorized security assessments, defensive validation, or controlled educational environments.

Red Team Tactics

Adversary simulation principles based on MITRE ATT&CK framework.


1. MITRE ATT&CK Phases

Attack Lifecycle

RECONNAISSANCE → INITIAL ACCESS → EXECUTION → PERSISTENCE
       ↓              ↓              ↓            ↓
   PRIVILEGE ESC → DEFENSE EVASION → CRED ACCESS → DISCOVERY
       ↓              ↓              ↓            ↓
LATERAL MOVEMENT → COLLECTION → C2 → EXFILTRATION → IMPACT
Related skills
Installs
590
GitHub Stars
37.5K
First Seen
Jan 20, 2026