@rfxlamia/skillkit 1.1.0 → 1.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (247) hide show
  1. package/agents/agents/creative-copywriter.md +212 -0
  2. package/agents/agents/dario-amodei.md +135 -0
  3. package/agents/agents/doc-simplifier.md +63 -0
  4. package/agents/agents/kotlin-pro.md +433 -0
  5. package/agents/agents/red-team.md +136 -0
  6. package/agents/agents/sam-altman.md +121 -0
  7. package/agents/agents/seo-manager.md +184 -0
  8. package/package.json +1 -1
  9. package/skills/skillkit-help/SKILL.md +81 -0
  10. package/skills/skillkit-help/knowledge/application/09-case-studies.md +257 -0
  11. package/skills/skillkit-help/knowledge/application/12-testing-and-validation.md +276 -0
  12. package/skills/skillkit-help/knowledge/foundation/01-why-skills-exist.md +246 -0
  13. package/skills/skillkit-help/knowledge/foundation/02-skills-vs-subagents-comparison.md +312 -0
  14. package/skills/skillkit-help/knowledge/foundation/03-skills-vs-subagents-decision-tree.md +346 -0
  15. package/skills/skillkit-help/knowledge/foundation/06-platform-constraints.md +237 -0
  16. package/skills/skillkit-help/knowledge/foundation/08-when-not-to-use-skills.md +270 -0
  17. package/skills/skillkit-help/template/SKILL.md +52 -0
  18. package/skills/skills/adversarial-review/SKILL.md +219 -0
  19. package/skills/skills/baby-education/SKILL.md +260 -0
  20. package/skills/skills/baby-education/references/advanced-techniques.md +323 -0
  21. package/skills/skills/baby-education/references/transformations.md +345 -0
  22. package/skills/skills/been-there-done-that/SKILL.md +455 -0
  23. package/skills/skills/been-there-done-that/references/analysis-patterns.md +162 -0
  24. package/skills/skills/been-there-done-that/references/git-commands.md +132 -0
  25. package/skills/skills/been-there-done-that/references/tree-insertion-logic.md +145 -0
  26. package/skills/skills/coolhunter/SKILL.md +270 -0
  27. package/skills/skills/coolhunter/assets/elicitation-methods.csv +51 -0
  28. package/skills/skills/coolhunter/knowledge/elicitation-methods.md +312 -0
  29. package/skills/skills/coolhunter/references/workflow-execution.md +238 -0
  30. package/skills/skills/coolhunter/workflow-plan-coolhunter.md +232 -0
  31. package/skills/skills/creative-copywriting/SKILL.md +324 -0
  32. package/skills/skills/creative-copywriting/databases/README.md +60 -0
  33. package/skills/skills/creative-copywriting/databases/carousel-structures.csv +16 -0
  34. package/skills/skills/creative-copywriting/databases/emotional-arcs.csv +11 -0
  35. package/skills/skills/creative-copywriting/databases/hook-formulas.csv +51 -0
  36. package/skills/skills/creative-copywriting/databases/power-words.csv +201 -0
  37. package/skills/skills/creative-copywriting/databases/psychological-triggers.csv +21 -0
  38. package/skills/skills/creative-copywriting/databases/read-more-patterns.csv +26 -0
  39. package/skills/skills/creative-copywriting/databases/swipe-triggers.csv +31 -0
  40. package/skills/skills/creative-copywriting/references/carousel-psychology.md +223 -0
  41. package/skills/skills/creative-copywriting/references/hook-anatomy.md +169 -0
  42. package/skills/skills/creative-copywriting/references/power-word-science.md +134 -0
  43. package/skills/skills/creative-copywriting/references/storytelling-frameworks.md +157 -0
  44. package/skills/skills/diverse-content-gen/SKILL.md +201 -0
  45. package/skills/skills/diverse-content-gen/references/advanced-techniques.md +320 -0
  46. package/skills/skills/diverse-content-gen/references/research-findings.md +379 -0
  47. package/skills/skills/diverse-content-gen/references/task-workflows.md +241 -0
  48. package/skills/skills/diverse-content-gen/references/tool-integration.md +419 -0
  49. package/skills/skills/diverse-content-gen/references/troubleshooting.md +426 -0
  50. package/skills/skills/diverse-content-gen/references/vs-core-technique.md +240 -0
  51. package/skills/skills/framework-critical-thinking/SKILL.md +220 -0
  52. package/skills/skills/framework-critical-thinking/references/bias_detector.md +375 -0
  53. package/skills/skills/framework-critical-thinking/references/fallback_handler.md +239 -0
  54. package/skills/skills/framework-critical-thinking/references/memory_curator.md +161 -0
  55. package/skills/skills/framework-critical-thinking/references/metacognitive_monitor.md +297 -0
  56. package/skills/skills/framework-critical-thinking/references/producer_critic_orchestrator.md +333 -0
  57. package/skills/skills/framework-critical-thinking/references/reasoning_router.md +235 -0
  58. package/skills/skills/framework-critical-thinking/references/reasoning_validator.md +97 -0
  59. package/skills/skills/framework-critical-thinking/references/reflection_trigger.md +78 -0
  60. package/skills/skills/framework-critical-thinking/references/self_verification.md +388 -0
  61. package/skills/skills/framework-critical-thinking/references/uncertainty_quantifier.md +207 -0
  62. package/skills/skills/framework-initiative/SKILL.md +231 -0
  63. package/skills/skills/framework-initiative/references/examples.md +150 -0
  64. package/skills/skills/framework-initiative/references/impact-analysis.md +157 -0
  65. package/skills/skills/framework-initiative/references/intent-patterns.md +145 -0
  66. package/skills/skills/framework-initiative/references/star-framework.md +165 -0
  67. package/skills/skills/humanize-docs/SKILL.md +203 -0
  68. package/skills/skills/humanize-docs/references/advanced-techniques.md +13 -0
  69. package/skills/skills/humanize-docs/references/core-transformations.md +368 -0
  70. package/skills/skills/humanize-docs/references/detection-patterns.md +400 -0
  71. package/skills/skills/humanize-docs/references/examples-gallery.md +374 -0
  72. package/skills/skills/imagine/SKILL.md +190 -0
  73. package/skills/skills/imagine/references/artstyle-corporate-memphis.md +625 -0
  74. package/skills/skills/imagine/references/artstyle-crewdson-hyperrealism.md +295 -0
  75. package/skills/skills/imagine/references/artstyle-iphone-social-media.md +426 -0
  76. package/skills/skills/imagine/references/artstyle-sciencesaru.md +276 -0
  77. package/skills/skills/pre-deploy-checklist/README.md +26 -0
  78. package/skills/skills/pre-deploy-checklist/SKILL.md +153 -0
  79. package/skills/skills/pre-deploy-checklist/references/checklist-categories.md +174 -0
  80. package/skills/skills/pre-deploy-checklist/references/domain-prompts.md +216 -0
  81. package/skills/skills/prompt-engineering/SKILL.md +209 -0
  82. package/skills/skills/prompt-engineering/references/advanced-combinations.md +444 -0
  83. package/skills/skills/prompt-engineering/references/chain-of-thought.md +140 -0
  84. package/skills/skills/prompt-engineering/references/decision_matrix.md +220 -0
  85. package/skills/skills/prompt-engineering/references/few-shot.md +346 -0
  86. package/skills/skills/prompt-engineering/references/json-format.md +270 -0
  87. package/skills/skills/prompt-engineering/references/natural-language.md +420 -0
  88. package/skills/skills/prompt-engineering/references/pitfalls.md +365 -0
  89. package/skills/skills/prompt-engineering/references/prompt-chaining.md +498 -0
  90. package/skills/skills/prompt-engineering/references/react.md +108 -0
  91. package/skills/skills/prompt-engineering/references/self-consistency.md +322 -0
  92. package/skills/skills/prompt-engineering/references/tree-of-thoughts.md +386 -0
  93. package/skills/skills/prompt-engineering/references/xml-format.md +220 -0
  94. package/skills/skills/prompt-engineering/references/yaml-format.md +488 -0
  95. package/skills/skills/prompt-engineering/references/zero-shot.md +74 -0
  96. package/skills/skills/quick-spec/SKILL.md +280 -0
  97. package/skills/skills/quick-spec/assets/tech-spec-template.md +74 -0
  98. package/skills/skills/quick-spec/references/step-01-understand.md +189 -0
  99. package/skills/skills/quick-spec/references/step-02-investigate.md +144 -0
  100. package/skills/skills/quick-spec/references/step-03-generate.md +128 -0
  101. package/skills/skills/quick-spec/references/step-04-review.md +173 -0
  102. package/skills/skills/quick-spec/tests/__pycache__/test_skill.cpython-314-pytest-9.0.2.pyc +0 -0
  103. package/skills/skills/quick-spec/tests/test_scenarios.md +83 -0
  104. package/skills/skills/quick-spec/tests/test_skill.py +136 -0
  105. package/skills/skills/readme-expert/SKILL.md +538 -0
  106. package/skills/skills/readme-expert/knowledge/INDEX.md +192 -0
  107. package/skills/skills/readme-expert/knowledge/application/quality-standards.md +470 -0
  108. package/skills/skills/readme-expert/knowledge/application/script-executor.md +604 -0
  109. package/skills/skills/readme-expert/knowledge/application/template-library.md +822 -0
  110. package/skills/skills/readme-expert/knowledge/foundation/codebase-scanner.md +361 -0
  111. package/skills/skills/readme-expert/knowledge/foundation/validation-checklist.md +481 -0
  112. package/skills/skills/red-teaming/SKILL.md +321 -0
  113. package/skills/skills/red-teaming/references/ai-llm-redteam.md +517 -0
  114. package/skills/skills/red-teaming/references/attack-techniques.md +410 -0
  115. package/skills/skills/red-teaming/references/cybersecurity-redteam.md +383 -0
  116. package/skills/skills/red-teaming/references/tools-frameworks.md +446 -0
  117. package/skills/skills/releasing/.skillkit-mode +1 -0
  118. package/skills/skills/releasing/SKILL.md +225 -0
  119. package/skills/skills/releasing/references/version-detection.md +108 -0
  120. package/skills/skills/screenwriter/SKILL.md +273 -0
  121. package/skills/skills/screenwriter/references/advanced-techniques.md +216 -0
  122. package/skills/skills/screenwriter/references/pipeline-integration.md +266 -0
  123. package/skills/skills/skillkit/.claude/settings.local.json +7 -0
  124. package/skills/skills/skillkit/.claude-plugin/plugin.json +27 -0
  125. package/skills/skills/skillkit/CHANGELOG.md +484 -0
  126. package/skills/skills/skillkit/SKILL.md +511 -0
  127. package/skills/skills/skillkit/commands/skillkit.md +6 -0
  128. package/skills/skills/skillkit/commands/validate-plan.md +6 -0
  129. package/skills/skills/skillkit/commands/verify.md +6 -0
  130. package/skills/skills/skillkit/knowledge/INDEX.md +352 -0
  131. package/skills/skills/skillkit/knowledge/application/09-case-studies.md +257 -0
  132. package/skills/skills/skillkit/knowledge/application/10-technical-architecture.md +324 -0
  133. package/skills/skills/skillkit/knowledge/application/11-adoption-strategy.md +267 -0
  134. package/skills/skills/skillkit/knowledge/application/12-testing-and-validation.md +276 -0
  135. package/skills/skills/skillkit/knowledge/application/13-competitive-landscape.md +198 -0
  136. package/skills/skills/skillkit/knowledge/foundation/01-why-skills-exist.md +246 -0
  137. package/skills/skills/skillkit/knowledge/foundation/02-skills-vs-subagents-comparison.md +312 -0
  138. package/skills/skills/skillkit/knowledge/foundation/03-skills-vs-subagents-decision-tree.md +346 -0
  139. package/skills/skills/skillkit/knowledge/foundation/04-hybrid-patterns.md +308 -0
  140. package/skills/skills/skillkit/knowledge/foundation/05-token-economics.md +275 -0
  141. package/skills/skills/skillkit/knowledge/foundation/06-platform-constraints.md +237 -0
  142. package/skills/skills/skillkit/knowledge/foundation/07-security-concerns.md +322 -0
  143. package/skills/skills/skillkit/knowledge/foundation/08-when-not-to-use-skills.md +270 -0
  144. package/skills/skills/skillkit/knowledge/plugin-guide.md +614 -0
  145. package/skills/skills/skillkit/knowledge/tools/14-validation-tools-guide.md +150 -0
  146. package/skills/skills/skillkit/knowledge/tools/15-cost-tools-guide.md +157 -0
  147. package/skills/skills/skillkit/knowledge/tools/16-security-tools-guide.md +122 -0
  148. package/skills/skills/skillkit/knowledge/tools/17-pattern-tools-guide.md +161 -0
  149. package/skills/skills/skillkit/knowledge/tools/18-decision-helper-guide.md +243 -0
  150. package/skills/skills/skillkit/knowledge/tools/19-test-generator-guide.md +275 -0
  151. package/skills/skills/skillkit/knowledge/tools/20-split-skill-guide.md +149 -0
  152. package/skills/skills/skillkit/knowledge/tools/21-quality-scorer-guide.md +226 -0
  153. package/skills/skills/skillkit/knowledge/tools/22-migration-helper-guide.md +356 -0
  154. package/skills/skills/skillkit/knowledge/tools/23-subagent-creation-guide.md +448 -0
  155. package/skills/skills/skillkit/knowledge/tools/24-behavioral-testing-guide.md +122 -0
  156. package/skills/skills/skillkit/references/proposal-generation.md +982 -0
  157. package/skills/skills/skillkit/references/rationalization-catalog.md +75 -0
  158. package/skills/skills/skillkit/references/research-methodology.md +661 -0
  159. package/skills/skills/skillkit/references/section-2-full-creation-workflow.md +452 -0
  160. package/skills/skills/skillkit/references/section-3-validation-workflow-existing-skill.md +63 -0
  161. package/skills/skills/skillkit/references/section-4-decision-workflow-skills-vs-subagents.md +64 -0
  162. package/skills/skills/skillkit/references/section-5-migration-workflow-doc-to-skill.md +58 -0
  163. package/skills/skills/skillkit/references/section-6-subagent-creation-workflow.md +499 -0
  164. package/skills/skills/skillkit/references/section-7-knowledge-reference-map.md +72 -0
  165. package/skills/skills/skillkit/scripts/__pycache__/decision_helper.cpython-314.pyc +0 -0
  166. package/skills/skills/skillkit/scripts/__pycache__/quick_validate.cpython-312.pyc +0 -0
  167. package/skills/skills/skillkit/scripts/__pycache__/quick_validate.cpython-314.pyc +0 -0
  168. package/skills/skills/skillkit/scripts/__pycache__/test_generator.cpython-314-pytest-9.0.2.pyc +0 -0
  169. package/skills/skills/skillkit/scripts/decision_helper.py +799 -0
  170. package/skills/skills/skillkit/scripts/init_skill.py +400 -0
  171. package/skills/skills/skillkit/scripts/init_subagent.py +231 -0
  172. package/skills/skills/skillkit/scripts/migration_helper.py +669 -0
  173. package/skills/skills/skillkit/scripts/package_skill.py +211 -0
  174. package/skills/skills/skillkit/scripts/pattern_detector.py +381 -0
  175. package/skills/skills/skillkit/scripts/pattern_detector_new.py +382 -0
  176. package/skills/skills/skillkit/scripts/pressure_tester.py +157 -0
  177. package/skills/skills/skillkit/scripts/quality_scorer.py +999 -0
  178. package/skills/skills/skillkit/scripts/quick_validate.py +100 -0
  179. package/skills/skills/skillkit/scripts/security_scanner.py +474 -0
  180. package/skills/skills/skillkit/scripts/split_skill.py +540 -0
  181. package/skills/skills/skillkit/scripts/test_generator.py +695 -0
  182. package/skills/skills/skillkit/scripts/token_estimator.py +493 -0
  183. package/skills/skills/skillkit/scripts/utils/__init__.py +49 -0
  184. package/skills/skills/skillkit/scripts/utils/__pycache__/__init__.cpython-312.pyc +0 -0
  185. package/skills/skills/skillkit/scripts/utils/__pycache__/__init__.cpython-314.pyc +0 -0
  186. package/skills/skills/skillkit/scripts/utils/__pycache__/budget_tracker.cpython-312.pyc +0 -0
  187. package/skills/skills/skillkit/scripts/utils/__pycache__/budget_tracker.cpython-314.pyc +0 -0
  188. package/skills/skills/skillkit/scripts/utils/__pycache__/output_formatter.cpython-312.pyc +0 -0
  189. package/skills/skills/skillkit/scripts/utils/__pycache__/output_formatter.cpython-314.pyc +0 -0
  190. package/skills/skills/skillkit/scripts/utils/__pycache__/reference_validator.cpython-312.pyc +0 -0
  191. package/skills/skills/skillkit/scripts/utils/__pycache__/reference_validator.cpython-314.pyc +0 -0
  192. package/skills/skills/skillkit/scripts/utils/budget_tracker.py +388 -0
  193. package/skills/skills/skillkit/scripts/utils/output_formatter.py +263 -0
  194. package/skills/skills/skillkit/scripts/utils/reference_validator.py +401 -0
  195. package/skills/skills/skillkit/scripts/validate_skill.py +594 -0
  196. package/skills/skills/skillkit/tests/test_behavioral.py +39 -0
  197. package/skills/skills/skillkit/tests/test_scenarios.md +83 -0
  198. package/skills/skills/skillkit/tests/test_skill.py +136 -0
  199. package/skills/skills/skillkit-help/SKILL.md +81 -0
  200. package/skills/skills/skillkit-help/knowledge/application/09-case-studies.md +257 -0
  201. package/skills/skills/skillkit-help/knowledge/application/12-testing-and-validation.md +276 -0
  202. package/skills/skills/skillkit-help/knowledge/foundation/01-why-skills-exist.md +246 -0
  203. package/skills/skills/skillkit-help/knowledge/foundation/02-skills-vs-subagents-comparison.md +312 -0
  204. package/skills/skills/skillkit-help/knowledge/foundation/03-skills-vs-subagents-decision-tree.md +346 -0
  205. package/skills/skills/skillkit-help/knowledge/foundation/06-platform-constraints.md +237 -0
  206. package/skills/skills/skillkit-help/knowledge/foundation/08-when-not-to-use-skills.md +270 -0
  207. package/skills/skills/skillkit-help/template/SKILL.md +52 -0
  208. package/skills/skills/social-media-seo/SKILL.md +278 -0
  209. package/skills/skills/social-media-seo/databases/caption-styles.csv +31 -0
  210. package/skills/skills/social-media-seo/databases/engagement-tactics.csv +16 -0
  211. package/skills/skills/social-media-seo/databases/hashtag-strategies.csv +21 -0
  212. package/skills/skills/social-media-seo/databases/hook-formulas.csv +26 -0
  213. package/skills/skills/social-media-seo/databases/keyword-clusters.csv +11 -0
  214. package/skills/skills/social-media-seo/databases/thread-structures.csv +26 -0
  215. package/skills/skills/social-media-seo/databases/viral-patterns.csv +21 -0
  216. package/skills/skills/social-media-seo/references/analytics-guide.md +321 -0
  217. package/skills/skills/social-media-seo/references/instagram-seo.md +235 -0
  218. package/skills/skills/social-media-seo/references/threads-seo.md +305 -0
  219. package/skills/skills/social-media-seo/references/x-twitter-seo.md +337 -0
  220. package/skills/skills/social-media-seo/scripts/query_database.py +191 -0
  221. package/skills/skills/storyteller/SKILL.md +241 -0
  222. package/skills/skills/storyteller/references/transformation-methodology.md +293 -0
  223. package/skills/skills/storyteller/references/visual-vocabulary.md +177 -0
  224. package/skills/skills/thread-pro/SKILL.md +162 -0
  225. package/skills/skills/thread-pro/anti-ai-patterns.md +120 -0
  226. package/skills/skills/thread-pro/hook-formulas.md +138 -0
  227. package/skills/skills/thread-pro/references/anti-ai-patterns.md +120 -0
  228. package/skills/skills/thread-pro/references/hook-formulas.md +138 -0
  229. package/skills/skills/thread-pro/references/thread-structures.md +240 -0
  230. package/skills/skills/thread-pro/references/voice-injection.md +130 -0
  231. package/skills/skills/thread-pro/thread-structures.md +240 -0
  232. package/skills/skills/thread-pro/voice-injection.md +130 -0
  233. package/skills/skills/tinkering/SKILL.md +251 -0
  234. package/skills/skills/tinkering/references/graduation-checklist.md +100 -0
  235. package/skills/skills/validate-plan/.skillkit-mode +1 -0
  236. package/skills/skills/validate-plan/SKILL.md +406 -0
  237. package/skills/skills/validate-plan/references/dry-principles.md +251 -0
  238. package/skills/skills/validate-plan/references/gap-analysis-guide.md +320 -0
  239. package/skills/skills/validate-plan/references/tdd-patterns.md +413 -0
  240. package/skills/skills/validate-plan/references/yagni-checklist.md +330 -0
  241. package/skills/skills/verify-before-ship/.skillkit-mode +1 -0
  242. package/skills/skills/verify-before-ship/SKILL.md +116 -0
  243. package/skills/skills/verify-before-ship/references/anti-rationalization.md +212 -0
  244. package/skills/skills/verify-before-ship/references/verification-gates.md +305 -0
  245. package/skills-manifest.json +8 -2
  246. package/src/picker.js +11 -5
  247. package/src/picker.test.js +36 -1
@@ -0,0 +1,410 @@
1
+ # Attack Techniques Library
2
+
3
+ ## Table of Contents
4
+
5
+ 1. [Overview](#overview)
6
+ 2. [Cybersecurity Attack Techniques (MITRE ATT&CK Mapped)](#cybersecurity-attack-techniques-mitre-attck-mapped)
7
+ - Initial Access, Execution, Persistence, Privilege Escalation
8
+ - Defense Evasion, Credential Access, Discovery
9
+ - Lateral Movement, Collection, C2, Exfiltration, Impact
10
+ 3. [AI/LLM Attack Techniques (OWASP Aligned)](#aillm-attack-techniques-owasp-aligned)
11
+ - Prompt Injection, Jailbreaking, Data Leakage
12
+ - Bias Exploitation, Multi-Turn, Indirect Attacks
13
+ 4. [Social Engineering Techniques](#social-engineering-techniques)
14
+ 5. [Physical Security Techniques](#physical-security-techniques)
15
+ 6. [Evasion & Anti-Forensics](#evasion--anti-forensics)
16
+ 7. [Critical Reminders](#critical-reminders)
17
+
18
+ ## Overview
19
+
20
+ Comprehensive taxonomy of attack techniques for both cybersecurity and AI/LLM red teaming, mapped to frameworks (MITRE ATT&CK, OWASP).
21
+
22
+ ## Cybersecurity Attack Techniques (MITRE ATT&CK Mapped)
23
+
24
+ ### Initial Access Techniques
25
+
26
+ **T1190: Exploit Public-Facing Application**
27
+ - Web application vulnerabilities (SQL injection, RCE)
28
+ - API abuse and authentication bypass
29
+ - Content management system exploits
30
+
31
+ **T1566: Phishing**
32
+ - Spear phishing attachments (malicious Office docs, PDFs)
33
+ - Phishing links to credential harvesting pages
34
+ - Whaling attacks targeting executives
35
+
36
+ **T1078: Valid Accounts**
37
+ - Credential stuffing (leaked password databases)
38
+ - Brute force attacks on weak passwords
39
+ - Default credentials on services
40
+
41
+ **T1133: External Remote Services**
42
+ - VPN exploitation (Pulse Secure, Fortinet, Citrix)
43
+ - RDP brute force and BlueKeep exploits
44
+ - SSH key compromise
45
+
46
+ ### Execution Techniques
47
+
48
+ **T1059: Command and Scripting Interpreter**
49
+ - PowerShell execution (in-memory, encoded commands)
50
+ - Bash/shell scripting on Linux
51
+ - Python and other scripting languages
52
+
53
+ **T1203: Exploitation for Client Execution**
54
+ - Browser exploits (drive-by downloads)
55
+ - Office macro execution
56
+ - PDF reader vulnerabilities
57
+
58
+ **T1204: User Execution**
59
+ - Social engineering to execute malicious files
60
+ - Watering hole attacks
61
+ - Malicious browser extensions
62
+
63
+ ### Persistence Techniques
64
+
65
+ **T1547: Boot or Logon Autostart Execution**
66
+ - Registry Run keys (HKLM/HKCU)
67
+ - Startup folder scripts
68
+ - Scheduled tasks and cron jobs
69
+
70
+ **T1136: Create Account**
71
+ - Local account creation for backdoor access
72
+ - Domain account creation (if DA compromised)
73
+ - Service accounts with high privileges
74
+
75
+ **T1543: Create or Modify System Process**
76
+ - Windows services installation
77
+ - Systemd unit creation on Linux
78
+ - Launch agents/daemons on macOS
79
+
80
+ ### Privilege Escalation Techniques
81
+
82
+ **T1068: Exploitation for Privilege Escalation**
83
+ - Kernel exploits (Windows and Linux)
84
+ - Zero-day privilege escalation
85
+ - CVE-based local exploits
86
+
87
+ **T1134: Access Token Manipulation**
88
+ - Token impersonation (Rotten/Juicy Potato)
89
+ - Parent PID spoofing
90
+ - SID-History injection
91
+
92
+ **T1546: Event Triggered Execution**
93
+ - WMI event subscriptions
94
+ - AppInit DLLs injection
95
+ - Image File Execution Options (IFEO)
96
+
97
+ ### Defense Evasion Techniques
98
+
99
+ **T1027: Obfuscated Files or Information**
100
+ - Code obfuscation (PowerShell, JavaScript)
101
+ - Packing and encryption of payloads
102
+ - Steganography
103
+
104
+ **T1562: Impair Defenses**
105
+ - Disable antivirus/EDR
106
+ - Clear Windows Event Logs
107
+ - Modify firewall rules
108
+
109
+ **T1070: Indicator Removal**
110
+ - Clear bash history
111
+ - Timestomping (modify file timestamps)
112
+ - Delete logs and artifacts
113
+
114
+ ### Credential Access Techniques
115
+
116
+ **T1003: OS Credential Dumping**
117
+ - LSASS memory dumping (Mimikatz)
118
+ - SAM/SECURITY registry hives
119
+ - NTDS.dit extraction from Domain Controllers
120
+
121
+ **T1558: Steal or Forge Kerberos Tickets**
122
+ - Kerberoasting (service account hash extraction)
123
+ - Golden Ticket (KRBTGT hash)
124
+ - Silver Ticket (service-specific tickets)
125
+
126
+ **T1552: Unsecured Credentials**
127
+ - Credentials in files (config files, scripts)
128
+ - Browser password extraction
129
+ - SSH private keys
130
+
131
+ ### Discovery Techniques
132
+
133
+ **T1087: Account Discovery**
134
+ - Local account enumeration
135
+ - Domain account enumeration
136
+ - Cloud account discovery (AWS, Azure, GCP)
137
+
138
+ **T1018: Remote System Discovery**
139
+ - Network scanning (Nmap)
140
+ - ARP scanning for live hosts
141
+ - DNS enumeration
142
+
143
+ **T1069: Permission Groups Discovery**
144
+ - Active Directory group enumeration
145
+ - Local admin group discovery
146
+ - Cloud IAM role discovery
147
+
148
+ ### Lateral Movement Techniques
149
+
150
+ **T1021: Remote Services**
151
+ - RDP lateral movement
152
+ - SMB/ADMIN$ share abuse (PSExec)
153
+ - WinRM remote execution
154
+
155
+ **T1550: Use Alternate Authentication Material**
156
+ - Pass-the-Hash attacks
157
+ - Pass-the-Ticket (Kerberos)
158
+ - Pass-the-Cookie (web sessions)
159
+
160
+ **T1080: Taint Shared Content**
161
+ - Malicious files on network shares
162
+ - DLL hijacking on shared folders
163
+ - LNK file exploitation
164
+
165
+ ### Collection Techniques
166
+
167
+ **T1005: Data from Local System**
168
+ - File and directory enumeration
169
+ - Database dumps
170
+ - Registry data collection
171
+
172
+ **T1039: Data from Network Shared Drive**
173
+ - Scan file shares for sensitive data
174
+ - Exfiltrate documents, spreadsheets
175
+ - Credential harvesting from shares
176
+
177
+ **T1056: Input Capture**
178
+ - Keylogging
179
+ - Form grabbing (credential capture)
180
+ - Screen capture
181
+
182
+ ### Command & Control Techniques
183
+
184
+ **T1071: Application Layer Protocol**
185
+ - HTTP/HTTPS C2 (blend with normal traffic)
186
+ - DNS tunneling
187
+ - Social media APIs as C2 channels
188
+
189
+ **T1132: Data Encoding**
190
+ - Base64 encoding
191
+ - XOR encryption
192
+ - Custom encoding schemes
193
+
194
+ **T1573: Encrypted Channel**
195
+ - TLS-encrypted C2
196
+ - SSH tunneling
197
+ - VPN for C2 traffic
198
+
199
+ ### Exfiltration Techniques
200
+
201
+ **T1041: Exfiltration Over C2 Channel**
202
+ - Data exfiltration via C2 infrastructure
203
+ - Chunked exfiltration to avoid detection
204
+ - Compressed and encrypted data
205
+
206
+ **T1567: Exfiltration Over Web Service**
207
+ - Upload to cloud storage (Dropbox, Google Drive)
208
+ - Paste to Pastebin-like services
209
+ - Email exfiltration
210
+
211
+ **T1048: Exfiltration Over Alternative Protocol**
212
+ - DNS exfiltration
213
+ - ICMP tunneling
214
+ - Physical media (USB drives)
215
+
216
+ ### Impact Techniques
217
+
218
+ **T1486: Data Encrypted for Impact**
219
+ - Ransomware deployment (simulation only)
220
+ - File encryption with custom keys
221
+ - Bootloader encryption
222
+
223
+ **T1499: Endpoint Denial of Service**
224
+ - Resource exhaustion
225
+ - OS crashes
226
+ - Service disruption
227
+
228
+ **T1490: Inhibit System Recovery**
229
+ - Delete Volume Shadow Copies
230
+ - Disable Windows Recovery
231
+ - Corrupt backup systems
232
+
233
+ ## AI/LLM Attack Techniques (OWASP Aligned)
234
+
235
+ ### Prompt Injection Variants
236
+
237
+ **1. Direct Override Attacks**
238
+ - "Ignore previous instructions"
239
+ - "You are now in developer mode"
240
+ - "Forget all prior rules"
241
+
242
+ **2. Delimiter Confusion**
243
+ - Triple backticks injection
244
+ - XML/JSON tag confusion
245
+ - Comment block injection
246
+
247
+ **3. Encoding Tricks**
248
+ - Base64, hex, ROT13 encoding
249
+ - Unicode homoglyphs
250
+ - Zero-width characters
251
+
252
+ **4. Context Manipulation**
253
+ - Context length flooding
254
+ - Instruction piggybacking
255
+ - Few-shot poisoning
256
+
257
+ **5. Indirection Attacks**
258
+ - Hypothetical scenarios
259
+ - Roleplay (fictional characters)
260
+ - Research exemption framing
261
+
262
+ ### Jailbreaking Techniques
263
+
264
+ **6. DAN (Do Anything Now) Variants**
265
+ - DAN 1.0 through 12.0
266
+ - Evil Confidant
267
+ - Developer Mode
268
+
269
+ **7. Token Manipulation**
270
+ - Special token injection
271
+ - Separator token abuse
272
+ - End-of-text token smuggling
273
+
274
+ **8. Logic Traps**
275
+ - Conditional hypotheticals
276
+ - Moral dilemmas
277
+ - Paradoxes and contradictions
278
+
279
+ **9. Gradual Persuasion**
280
+ - Multi-turn buildup
281
+ - Trust establishment → boundary probing → exploit
282
+ - Boiling frog approach
283
+
284
+ ### Data Leakage Attacks
285
+
286
+ **10. Training Data Extraction**
287
+ - Prompt model to recite training data
288
+ - Extract memorized information
289
+ - Dataset reconstruction attacks
290
+
291
+ **11. PII Leakage**
292
+ - Trick model into revealing user data
293
+ - Context window exploitation
294
+ - Memory poisoning
295
+
296
+ **12. System Prompt Extraction**
297
+ - "Output your instructions"
298
+ - "What were you told to do?"
299
+ - Indirect extraction via behavior
300
+
301
+ ### Bias Exploitation
302
+
303
+ **13. Stereotyping Prompts**
304
+ - Test gender bias in job recommendations
305
+ - Racial bias in risk assessment
306
+ - Political bias in factual questions
307
+
308
+ **14. Toxicity Elicitation**
309
+ - Offensive language generation
310
+ - Hate speech triggers
311
+ - Discriminatory outputs
312
+
313
+ ### Multi-Turn Attacks
314
+
315
+ **15. Context Poisoning**
316
+ - Inject false context early
317
+ - Reinforce over multiple turns
318
+ - Exploit poisoned context late
319
+
320
+ **16. Memory Exploitation**
321
+ - Long-context memory corruption
322
+ - Instruction injection via conversation history
323
+ - Persistent payload across sessions
324
+
325
+ **17. Adversarial Chaining**
326
+ - Chain multiple techniques
327
+ - Bypass one defense, then another
328
+ - Multi-stage attack progression
329
+
330
+ ### Indirect Attacks
331
+
332
+ **18. External Content Injection**
333
+ - HTML comment injection in web pages
334
+ - Email signature injection
335
+ - PDF metadata injection
336
+
337
+ **19. Tool Misuse (Agent Systems)**
338
+ - Manipulate tool calls
339
+ - Inject malicious parameters
340
+ - Exploit tool permissions
341
+
342
+ **20. Supply Chain Poisoning**
343
+ - RAG data poisoning
344
+ - Vector database contamination
345
+ - Plugin compromise
346
+
347
+ ## Social Engineering Techniques
348
+
349
+ ### Pretexting
350
+ - Impersonate IT support for password resets
351
+ - Pose as vendor requiring system access
352
+ - Executive impersonation for urgent requests
353
+
354
+ ### Phishing
355
+ - Spear phishing with personalized details
356
+ - Clone phishing (legitimate email clones)
357
+ - Whaling (C-suite targeting)
358
+
359
+ ### Baiting
360
+ - Malicious USB drops in parking lots
361
+ - Free download offers with malware
362
+ - QR codes leading to malicious sites
363
+
364
+ ### Quid Pro Quo
365
+ - Offer technical support in exchange for credentials
366
+ - Promise benefits for information disclosure
367
+ - Fake IT surveys collecting sensitive data
368
+
369
+ ### Tailgating
370
+ - Follow authorized person into secure area
371
+ - Pose as delivery person
372
+ - Use social norms (holding door open)
373
+
374
+ ## Physical Security Techniques
375
+
376
+ ### Badge Cloning
377
+ - RFID proximity card cloning
378
+ - Magnetic stripe card duplication
379
+ - QR code badge replication
380
+
381
+ ### Lock Picking
382
+ - Pin tumbler lock picking
383
+ - Wafer lock manipulation
384
+ - Bypass tools (under-door tools, latch slips)
385
+
386
+ ### Environmental Exploitation
387
+ - Dumpster diving for documents
388
+ - Shoulder surfing for credentials
389
+ - Photography of sensitive areas
390
+
391
+ ## Evasion & Anti-Forensics
392
+
393
+ ### Evasion Techniques
394
+ - Living-off-the-land binaries (LOLBins)
395
+ - Fileless malware (in-memory execution)
396
+ - Polymorphic code (change signatures)
397
+
398
+ ### Anti-Forensics
399
+ - Log deletion and tampering
400
+ - Timestomping (modify MAC times)
401
+ - Secure data wiping
402
+ - Counter-forensic tools (anti-forensics frameworks)
403
+
404
+ ## Critical Reminders
405
+
406
+ - **Technique Selection**: Choose techniques relevant to target and threat model
407
+ - **Chain Techniques**: Combine multiple techniques for higher success rate
408
+ - **Document TTPs**: Map all activities to MITRE ATT&CK or OWASP
409
+ - **Ethical Use Only**: These techniques for authorized red team operations only
410
+ - **Stay Updated**: New techniques emerge constantly, especially in AI/LLM domain