This repository hosts curated scenarios for the OpenBAS platform, contributed by internal teams and the community. These scenarios are designed to simulate offensive campaigns, test injectors, or demonstrate detection and response capabilities β supporting red, blue, and purple teaming efforts.
.
βββ scenarios/
β βββ Akira Ransomware.json
β βββ DragonForce Ransomware.json
Downloaded individually Imported directly into the OpenBAS interface Customized to reflect specific use cases
- Navigate to the scenarios/ folder.
- Download the scenario file(s) you want.
- In your OpenBAS platform, go to Scenarios > Import button.
- Upload the JSON file to begin using the scenario.
- You can import scenario on your OpenBAS platform
Scenario Name | Description |
---|---|
Akira Ransomware | Simulates techniques used by Akira actors. Credit to skandler GitHub Repository |
DragonForce Ransomware | Emulates ransomware tactics from DragonForce. Credit to marcopedrinazzi GitHub Repository |
We welcome contributions from the community! To add your own scenario:
- Create a valid OpenBAS scenario
- Export it with the "Export Scenario" button
- Extract the Zip file generated
- Add the JSON file from the ZIP to the scenarios/ folder.
- Submit a pull request with a clear description.
- Please follow naming conventions and provide meaningful metadata within your scenarios.
Questions, feedback, or want to discuss scenario design? Join the OpenBAS Slack or open an issue in this repository.