Files
atomic-red-team/execution-frameworks
Carrie Roberts b43af855ba Only show cleanup (with inputs) if there are inputs (#792)
* move emond test into correct T#

* only show cleanup with inputs if there are inputs

Co-authored-by: Tony M Lambert <ForensicITGuy@users.noreply.github.com>
Co-authored-by: Michael Haag <mike@redcanary.com>
2020-01-24 09:19:10 -07:00
..
2019-11-11 14:26:23 -07:00

Atomic Red Team Execution Frameworks

This repository contains execution frameworks that help you run Atomic Tests in your environment. Each atomic test is defined in the atomics folder inside their respective Mitre Att&ck T# folders. Within each T# folder you will find a yaml file that defines the commands to be run during the test and an easier to read markdown (md) of the same thing. Here is an example markdown file describing some of the tests that can be run using one of the below execution frameworks.

Invoke-AtomicRedTeam

Invoke-AtomicRedTeam is written in PowerShell, which can be executed cross-platform using PowerShell Core for Linux and MacOS.
For detailed installation and usage instructions refer to the README file inside of the Invoke-AtomicRedTeam folder.

Python

Surprise, this framework is written in Python. For detailed installation and usage instructions refer to the README file inside of the contrib/python folder.

Ruby

Ruby version of the execution framework.