Files
atomic-red-team/execution-frameworks
Fabricio Brunetti a49e529a34 Leverage PathToAtomicsFolder in Python framework (#675)
Parsing the command to replace PathToAtomicsFolder variable.
Can-t use environment variables as some Powershell based tests use "$PathToAtomicsFolder".
I admit that it-s a bit hackish but I think it-s the most straightforward way to handle this without going through a major refactor of this framework
2019-11-19 15:20:59 -07:00
..
2019-11-11 14:26:23 -07:00

Atomic Red Team Execution Frameworks

This repository contains execution frameworks that help you run Atomic Tests in your environment. Each atomic test is defined in the atomics folder inside their respective Mitre Att&ck T# folders. Within each T# folder you will find a yaml file that defines the commands to be run during the test and an easier to read markdown (md) of the same thing. Here is an example markdown file describing some of the tests that can be run using one of the below execution frameworks.

Invoke-AtomicRedTeam

Invoke-AtomicRedTeam is written in PowerShell, which can be executed cross-platform using PowerShell Core for Linux and MacOS.
For detailed installation and usage instructions refer to the README file inside of the Invoke-AtomicRedTeam folder.

Python

Surprise, this framework is written in Python. For detailed installation and usage instructions refer to the README file inside of the contrib/python folder.

Ruby

Ruby version of the execution framework.