Warning
This repository is archived and no longer actively maintained.
Attack Simulator Framework is a modular, MITRE ATT&CK–aligned adversary simulation framework that empowers Red Teams, Purple Teams, and security engineers to test and enhance enterprise security defenses.
- Modular and extensible technique architecture
- YAML-based attack profiles
- Automatic reporting (JSON + Markdown)
The framework is built around three core components:
- Loads and executes attack techniques
- Manages execution flow
- Generates structured reports
- Easy to extend and customize
- Supports multiple platforms
- YAML files define attack chains
- Example: Discovery → Persistence → Lateral Movement
attack-simulator-framework/
├── src/
│ ├── core/
│ ├── techniques/
│ └── utils/
├── configs/
├── reports/
│ └── (auto-generated reports)
├── tests/
├── CODE_OF_CONDUCT.md
├── LICENSE
├── README.md
├── SECURITY.md
└── requirements.txt
- Windows
- Linux
- macOS
- Python 3.11+
# Clone repository
git clone https://github.com/secwexen/attack-simulator-framework.git
cd attack-simulator-framework
# Create virtual environment
python -m venv venv
source venv/bin/activate # Linux/Mac
venv\Scripts\activate # Windows
# Install dependencies
pip install -r requirements.txt
# Install dev dependencies
pip install -r dev-requirements.txt--profile Specify attack profile YAML file to execute
--verbose Enable detailed logging
--dry-run Simulate attacks without executing actions
Run an attack profile:
python src/main.py --profile configs/attack_profile_example.yamlThis tool is intended for authorized security testing, research, and educational purposes only. Unauthorized use against systems without explicit permission is illegal and strictly prohibited. The authors are not responsible for misuse.
Copyright © 2026 secwexen.
This project is licensed under the Apache-2.0 License.
See the LICENSE file for full details.