@rfxlamia/skillkit 1.1.0 → 1.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (247) hide show
  1. package/agents/agents/creative-copywriter.md +212 -0
  2. package/agents/agents/dario-amodei.md +135 -0
  3. package/agents/agents/doc-simplifier.md +63 -0
  4. package/agents/agents/kotlin-pro.md +433 -0
  5. package/agents/agents/red-team.md +136 -0
  6. package/agents/agents/sam-altman.md +121 -0
  7. package/agents/agents/seo-manager.md +184 -0
  8. package/package.json +1 -1
  9. package/skills/skillkit-help/SKILL.md +81 -0
  10. package/skills/skillkit-help/knowledge/application/09-case-studies.md +257 -0
  11. package/skills/skillkit-help/knowledge/application/12-testing-and-validation.md +276 -0
  12. package/skills/skillkit-help/knowledge/foundation/01-why-skills-exist.md +246 -0
  13. package/skills/skillkit-help/knowledge/foundation/02-skills-vs-subagents-comparison.md +312 -0
  14. package/skills/skillkit-help/knowledge/foundation/03-skills-vs-subagents-decision-tree.md +346 -0
  15. package/skills/skillkit-help/knowledge/foundation/06-platform-constraints.md +237 -0
  16. package/skills/skillkit-help/knowledge/foundation/08-when-not-to-use-skills.md +270 -0
  17. package/skills/skillkit-help/template/SKILL.md +52 -0
  18. package/skills/skills/adversarial-review/SKILL.md +219 -0
  19. package/skills/skills/baby-education/SKILL.md +260 -0
  20. package/skills/skills/baby-education/references/advanced-techniques.md +323 -0
  21. package/skills/skills/baby-education/references/transformations.md +345 -0
  22. package/skills/skills/been-there-done-that/SKILL.md +455 -0
  23. package/skills/skills/been-there-done-that/references/analysis-patterns.md +162 -0
  24. package/skills/skills/been-there-done-that/references/git-commands.md +132 -0
  25. package/skills/skills/been-there-done-that/references/tree-insertion-logic.md +145 -0
  26. package/skills/skills/coolhunter/SKILL.md +270 -0
  27. package/skills/skills/coolhunter/assets/elicitation-methods.csv +51 -0
  28. package/skills/skills/coolhunter/knowledge/elicitation-methods.md +312 -0
  29. package/skills/skills/coolhunter/references/workflow-execution.md +238 -0
  30. package/skills/skills/coolhunter/workflow-plan-coolhunter.md +232 -0
  31. package/skills/skills/creative-copywriting/SKILL.md +324 -0
  32. package/skills/skills/creative-copywriting/databases/README.md +60 -0
  33. package/skills/skills/creative-copywriting/databases/carousel-structures.csv +16 -0
  34. package/skills/skills/creative-copywriting/databases/emotional-arcs.csv +11 -0
  35. package/skills/skills/creative-copywriting/databases/hook-formulas.csv +51 -0
  36. package/skills/skills/creative-copywriting/databases/power-words.csv +201 -0
  37. package/skills/skills/creative-copywriting/databases/psychological-triggers.csv +21 -0
  38. package/skills/skills/creative-copywriting/databases/read-more-patterns.csv +26 -0
  39. package/skills/skills/creative-copywriting/databases/swipe-triggers.csv +31 -0
  40. package/skills/skills/creative-copywriting/references/carousel-psychology.md +223 -0
  41. package/skills/skills/creative-copywriting/references/hook-anatomy.md +169 -0
  42. package/skills/skills/creative-copywriting/references/power-word-science.md +134 -0
  43. package/skills/skills/creative-copywriting/references/storytelling-frameworks.md +157 -0
  44. package/skills/skills/diverse-content-gen/SKILL.md +201 -0
  45. package/skills/skills/diverse-content-gen/references/advanced-techniques.md +320 -0
  46. package/skills/skills/diverse-content-gen/references/research-findings.md +379 -0
  47. package/skills/skills/diverse-content-gen/references/task-workflows.md +241 -0
  48. package/skills/skills/diverse-content-gen/references/tool-integration.md +419 -0
  49. package/skills/skills/diverse-content-gen/references/troubleshooting.md +426 -0
  50. package/skills/skills/diverse-content-gen/references/vs-core-technique.md +240 -0
  51. package/skills/skills/framework-critical-thinking/SKILL.md +220 -0
  52. package/skills/skills/framework-critical-thinking/references/bias_detector.md +375 -0
  53. package/skills/skills/framework-critical-thinking/references/fallback_handler.md +239 -0
  54. package/skills/skills/framework-critical-thinking/references/memory_curator.md +161 -0
  55. package/skills/skills/framework-critical-thinking/references/metacognitive_monitor.md +297 -0
  56. package/skills/skills/framework-critical-thinking/references/producer_critic_orchestrator.md +333 -0
  57. package/skills/skills/framework-critical-thinking/references/reasoning_router.md +235 -0
  58. package/skills/skills/framework-critical-thinking/references/reasoning_validator.md +97 -0
  59. package/skills/skills/framework-critical-thinking/references/reflection_trigger.md +78 -0
  60. package/skills/skills/framework-critical-thinking/references/self_verification.md +388 -0
  61. package/skills/skills/framework-critical-thinking/references/uncertainty_quantifier.md +207 -0
  62. package/skills/skills/framework-initiative/SKILL.md +231 -0
  63. package/skills/skills/framework-initiative/references/examples.md +150 -0
  64. package/skills/skills/framework-initiative/references/impact-analysis.md +157 -0
  65. package/skills/skills/framework-initiative/references/intent-patterns.md +145 -0
  66. package/skills/skills/framework-initiative/references/star-framework.md +165 -0
  67. package/skills/skills/humanize-docs/SKILL.md +203 -0
  68. package/skills/skills/humanize-docs/references/advanced-techniques.md +13 -0
  69. package/skills/skills/humanize-docs/references/core-transformations.md +368 -0
  70. package/skills/skills/humanize-docs/references/detection-patterns.md +400 -0
  71. package/skills/skills/humanize-docs/references/examples-gallery.md +374 -0
  72. package/skills/skills/imagine/SKILL.md +190 -0
  73. package/skills/skills/imagine/references/artstyle-corporate-memphis.md +625 -0
  74. package/skills/skills/imagine/references/artstyle-crewdson-hyperrealism.md +295 -0
  75. package/skills/skills/imagine/references/artstyle-iphone-social-media.md +426 -0
  76. package/skills/skills/imagine/references/artstyle-sciencesaru.md +276 -0
  77. package/skills/skills/pre-deploy-checklist/README.md +26 -0
  78. package/skills/skills/pre-deploy-checklist/SKILL.md +153 -0
  79. package/skills/skills/pre-deploy-checklist/references/checklist-categories.md +174 -0
  80. package/skills/skills/pre-deploy-checklist/references/domain-prompts.md +216 -0
  81. package/skills/skills/prompt-engineering/SKILL.md +209 -0
  82. package/skills/skills/prompt-engineering/references/advanced-combinations.md +444 -0
  83. package/skills/skills/prompt-engineering/references/chain-of-thought.md +140 -0
  84. package/skills/skills/prompt-engineering/references/decision_matrix.md +220 -0
  85. package/skills/skills/prompt-engineering/references/few-shot.md +346 -0
  86. package/skills/skills/prompt-engineering/references/json-format.md +270 -0
  87. package/skills/skills/prompt-engineering/references/natural-language.md +420 -0
  88. package/skills/skills/prompt-engineering/references/pitfalls.md +365 -0
  89. package/skills/skills/prompt-engineering/references/prompt-chaining.md +498 -0
  90. package/skills/skills/prompt-engineering/references/react.md +108 -0
  91. package/skills/skills/prompt-engineering/references/self-consistency.md +322 -0
  92. package/skills/skills/prompt-engineering/references/tree-of-thoughts.md +386 -0
  93. package/skills/skills/prompt-engineering/references/xml-format.md +220 -0
  94. package/skills/skills/prompt-engineering/references/yaml-format.md +488 -0
  95. package/skills/skills/prompt-engineering/references/zero-shot.md +74 -0
  96. package/skills/skills/quick-spec/SKILL.md +280 -0
  97. package/skills/skills/quick-spec/assets/tech-spec-template.md +74 -0
  98. package/skills/skills/quick-spec/references/step-01-understand.md +189 -0
  99. package/skills/skills/quick-spec/references/step-02-investigate.md +144 -0
  100. package/skills/skills/quick-spec/references/step-03-generate.md +128 -0
  101. package/skills/skills/quick-spec/references/step-04-review.md +173 -0
  102. package/skills/skills/quick-spec/tests/__pycache__/test_skill.cpython-314-pytest-9.0.2.pyc +0 -0
  103. package/skills/skills/quick-spec/tests/test_scenarios.md +83 -0
  104. package/skills/skills/quick-spec/tests/test_skill.py +136 -0
  105. package/skills/skills/readme-expert/SKILL.md +538 -0
  106. package/skills/skills/readme-expert/knowledge/INDEX.md +192 -0
  107. package/skills/skills/readme-expert/knowledge/application/quality-standards.md +470 -0
  108. package/skills/skills/readme-expert/knowledge/application/script-executor.md +604 -0
  109. package/skills/skills/readme-expert/knowledge/application/template-library.md +822 -0
  110. package/skills/skills/readme-expert/knowledge/foundation/codebase-scanner.md +361 -0
  111. package/skills/skills/readme-expert/knowledge/foundation/validation-checklist.md +481 -0
  112. package/skills/skills/red-teaming/SKILL.md +321 -0
  113. package/skills/skills/red-teaming/references/ai-llm-redteam.md +517 -0
  114. package/skills/skills/red-teaming/references/attack-techniques.md +410 -0
  115. package/skills/skills/red-teaming/references/cybersecurity-redteam.md +383 -0
  116. package/skills/skills/red-teaming/references/tools-frameworks.md +446 -0
  117. package/skills/skills/releasing/.skillkit-mode +1 -0
  118. package/skills/skills/releasing/SKILL.md +225 -0
  119. package/skills/skills/releasing/references/version-detection.md +108 -0
  120. package/skills/skills/screenwriter/SKILL.md +273 -0
  121. package/skills/skills/screenwriter/references/advanced-techniques.md +216 -0
  122. package/skills/skills/screenwriter/references/pipeline-integration.md +266 -0
  123. package/skills/skills/skillkit/.claude/settings.local.json +7 -0
  124. package/skills/skills/skillkit/.claude-plugin/plugin.json +27 -0
  125. package/skills/skills/skillkit/CHANGELOG.md +484 -0
  126. package/skills/skills/skillkit/SKILL.md +511 -0
  127. package/skills/skills/skillkit/commands/skillkit.md +6 -0
  128. package/skills/skills/skillkit/commands/validate-plan.md +6 -0
  129. package/skills/skills/skillkit/commands/verify.md +6 -0
  130. package/skills/skills/skillkit/knowledge/INDEX.md +352 -0
  131. package/skills/skills/skillkit/knowledge/application/09-case-studies.md +257 -0
  132. package/skills/skills/skillkit/knowledge/application/10-technical-architecture.md +324 -0
  133. package/skills/skills/skillkit/knowledge/application/11-adoption-strategy.md +267 -0
  134. package/skills/skills/skillkit/knowledge/application/12-testing-and-validation.md +276 -0
  135. package/skills/skills/skillkit/knowledge/application/13-competitive-landscape.md +198 -0
  136. package/skills/skills/skillkit/knowledge/foundation/01-why-skills-exist.md +246 -0
  137. package/skills/skills/skillkit/knowledge/foundation/02-skills-vs-subagents-comparison.md +312 -0
  138. package/skills/skills/skillkit/knowledge/foundation/03-skills-vs-subagents-decision-tree.md +346 -0
  139. package/skills/skills/skillkit/knowledge/foundation/04-hybrid-patterns.md +308 -0
  140. package/skills/skills/skillkit/knowledge/foundation/05-token-economics.md +275 -0
  141. package/skills/skills/skillkit/knowledge/foundation/06-platform-constraints.md +237 -0
  142. package/skills/skills/skillkit/knowledge/foundation/07-security-concerns.md +322 -0
  143. package/skills/skills/skillkit/knowledge/foundation/08-when-not-to-use-skills.md +270 -0
  144. package/skills/skills/skillkit/knowledge/plugin-guide.md +614 -0
  145. package/skills/skills/skillkit/knowledge/tools/14-validation-tools-guide.md +150 -0
  146. package/skills/skills/skillkit/knowledge/tools/15-cost-tools-guide.md +157 -0
  147. package/skills/skills/skillkit/knowledge/tools/16-security-tools-guide.md +122 -0
  148. package/skills/skills/skillkit/knowledge/tools/17-pattern-tools-guide.md +161 -0
  149. package/skills/skills/skillkit/knowledge/tools/18-decision-helper-guide.md +243 -0
  150. package/skills/skills/skillkit/knowledge/tools/19-test-generator-guide.md +275 -0
  151. package/skills/skills/skillkit/knowledge/tools/20-split-skill-guide.md +149 -0
  152. package/skills/skills/skillkit/knowledge/tools/21-quality-scorer-guide.md +226 -0
  153. package/skills/skills/skillkit/knowledge/tools/22-migration-helper-guide.md +356 -0
  154. package/skills/skills/skillkit/knowledge/tools/23-subagent-creation-guide.md +448 -0
  155. package/skills/skills/skillkit/knowledge/tools/24-behavioral-testing-guide.md +122 -0
  156. package/skills/skills/skillkit/references/proposal-generation.md +982 -0
  157. package/skills/skills/skillkit/references/rationalization-catalog.md +75 -0
  158. package/skills/skills/skillkit/references/research-methodology.md +661 -0
  159. package/skills/skills/skillkit/references/section-2-full-creation-workflow.md +452 -0
  160. package/skills/skills/skillkit/references/section-3-validation-workflow-existing-skill.md +63 -0
  161. package/skills/skills/skillkit/references/section-4-decision-workflow-skills-vs-subagents.md +64 -0
  162. package/skills/skills/skillkit/references/section-5-migration-workflow-doc-to-skill.md +58 -0
  163. package/skills/skills/skillkit/references/section-6-subagent-creation-workflow.md +499 -0
  164. package/skills/skills/skillkit/references/section-7-knowledge-reference-map.md +72 -0
  165. package/skills/skills/skillkit/scripts/__pycache__/decision_helper.cpython-314.pyc +0 -0
  166. package/skills/skills/skillkit/scripts/__pycache__/quick_validate.cpython-312.pyc +0 -0
  167. package/skills/skills/skillkit/scripts/__pycache__/quick_validate.cpython-314.pyc +0 -0
  168. package/skills/skills/skillkit/scripts/__pycache__/test_generator.cpython-314-pytest-9.0.2.pyc +0 -0
  169. package/skills/skills/skillkit/scripts/decision_helper.py +799 -0
  170. package/skills/skills/skillkit/scripts/init_skill.py +400 -0
  171. package/skills/skills/skillkit/scripts/init_subagent.py +231 -0
  172. package/skills/skills/skillkit/scripts/migration_helper.py +669 -0
  173. package/skills/skills/skillkit/scripts/package_skill.py +211 -0
  174. package/skills/skills/skillkit/scripts/pattern_detector.py +381 -0
  175. package/skills/skills/skillkit/scripts/pattern_detector_new.py +382 -0
  176. package/skills/skills/skillkit/scripts/pressure_tester.py +157 -0
  177. package/skills/skills/skillkit/scripts/quality_scorer.py +999 -0
  178. package/skills/skills/skillkit/scripts/quick_validate.py +100 -0
  179. package/skills/skills/skillkit/scripts/security_scanner.py +474 -0
  180. package/skills/skills/skillkit/scripts/split_skill.py +540 -0
  181. package/skills/skills/skillkit/scripts/test_generator.py +695 -0
  182. package/skills/skills/skillkit/scripts/token_estimator.py +493 -0
  183. package/skills/skills/skillkit/scripts/utils/__init__.py +49 -0
  184. package/skills/skills/skillkit/scripts/utils/__pycache__/__init__.cpython-312.pyc +0 -0
  185. package/skills/skills/skillkit/scripts/utils/__pycache__/__init__.cpython-314.pyc +0 -0
  186. package/skills/skills/skillkit/scripts/utils/__pycache__/budget_tracker.cpython-312.pyc +0 -0
  187. package/skills/skills/skillkit/scripts/utils/__pycache__/budget_tracker.cpython-314.pyc +0 -0
  188. package/skills/skills/skillkit/scripts/utils/__pycache__/output_formatter.cpython-312.pyc +0 -0
  189. package/skills/skills/skillkit/scripts/utils/__pycache__/output_formatter.cpython-314.pyc +0 -0
  190. package/skills/skills/skillkit/scripts/utils/__pycache__/reference_validator.cpython-312.pyc +0 -0
  191. package/skills/skills/skillkit/scripts/utils/__pycache__/reference_validator.cpython-314.pyc +0 -0
  192. package/skills/skills/skillkit/scripts/utils/budget_tracker.py +388 -0
  193. package/skills/skills/skillkit/scripts/utils/output_formatter.py +263 -0
  194. package/skills/skills/skillkit/scripts/utils/reference_validator.py +401 -0
  195. package/skills/skills/skillkit/scripts/validate_skill.py +594 -0
  196. package/skills/skills/skillkit/tests/test_behavioral.py +39 -0
  197. package/skills/skills/skillkit/tests/test_scenarios.md +83 -0
  198. package/skills/skills/skillkit/tests/test_skill.py +136 -0
  199. package/skills/skills/skillkit-help/SKILL.md +81 -0
  200. package/skills/skills/skillkit-help/knowledge/application/09-case-studies.md +257 -0
  201. package/skills/skills/skillkit-help/knowledge/application/12-testing-and-validation.md +276 -0
  202. package/skills/skills/skillkit-help/knowledge/foundation/01-why-skills-exist.md +246 -0
  203. package/skills/skills/skillkit-help/knowledge/foundation/02-skills-vs-subagents-comparison.md +312 -0
  204. package/skills/skills/skillkit-help/knowledge/foundation/03-skills-vs-subagents-decision-tree.md +346 -0
  205. package/skills/skills/skillkit-help/knowledge/foundation/06-platform-constraints.md +237 -0
  206. package/skills/skills/skillkit-help/knowledge/foundation/08-when-not-to-use-skills.md +270 -0
  207. package/skills/skills/skillkit-help/template/SKILL.md +52 -0
  208. package/skills/skills/social-media-seo/SKILL.md +278 -0
  209. package/skills/skills/social-media-seo/databases/caption-styles.csv +31 -0
  210. package/skills/skills/social-media-seo/databases/engagement-tactics.csv +16 -0
  211. package/skills/skills/social-media-seo/databases/hashtag-strategies.csv +21 -0
  212. package/skills/skills/social-media-seo/databases/hook-formulas.csv +26 -0
  213. package/skills/skills/social-media-seo/databases/keyword-clusters.csv +11 -0
  214. package/skills/skills/social-media-seo/databases/thread-structures.csv +26 -0
  215. package/skills/skills/social-media-seo/databases/viral-patterns.csv +21 -0
  216. package/skills/skills/social-media-seo/references/analytics-guide.md +321 -0
  217. package/skills/skills/social-media-seo/references/instagram-seo.md +235 -0
  218. package/skills/skills/social-media-seo/references/threads-seo.md +305 -0
  219. package/skills/skills/social-media-seo/references/x-twitter-seo.md +337 -0
  220. package/skills/skills/social-media-seo/scripts/query_database.py +191 -0
  221. package/skills/skills/storyteller/SKILL.md +241 -0
  222. package/skills/skills/storyteller/references/transformation-methodology.md +293 -0
  223. package/skills/skills/storyteller/references/visual-vocabulary.md +177 -0
  224. package/skills/skills/thread-pro/SKILL.md +162 -0
  225. package/skills/skills/thread-pro/anti-ai-patterns.md +120 -0
  226. package/skills/skills/thread-pro/hook-formulas.md +138 -0
  227. package/skills/skills/thread-pro/references/anti-ai-patterns.md +120 -0
  228. package/skills/skills/thread-pro/references/hook-formulas.md +138 -0
  229. package/skills/skills/thread-pro/references/thread-structures.md +240 -0
  230. package/skills/skills/thread-pro/references/voice-injection.md +130 -0
  231. package/skills/skills/thread-pro/thread-structures.md +240 -0
  232. package/skills/skills/thread-pro/voice-injection.md +130 -0
  233. package/skills/skills/tinkering/SKILL.md +251 -0
  234. package/skills/skills/tinkering/references/graduation-checklist.md +100 -0
  235. package/skills/skills/validate-plan/.skillkit-mode +1 -0
  236. package/skills/skills/validate-plan/SKILL.md +406 -0
  237. package/skills/skills/validate-plan/references/dry-principles.md +251 -0
  238. package/skills/skills/validate-plan/references/gap-analysis-guide.md +320 -0
  239. package/skills/skills/validate-plan/references/tdd-patterns.md +413 -0
  240. package/skills/skills/validate-plan/references/yagni-checklist.md +330 -0
  241. package/skills/skills/verify-before-ship/.skillkit-mode +1 -0
  242. package/skills/skills/verify-before-ship/SKILL.md +116 -0
  243. package/skills/skills/verify-before-ship/references/anti-rationalization.md +212 -0
  244. package/skills/skills/verify-before-ship/references/verification-gates.md +305 -0
  245. package/skills-manifest.json +8 -2
  246. package/src/picker.js +11 -5
  247. package/src/picker.test.js +36 -1
@@ -0,0 +1,383 @@
1
+ # Cybersecurity Red Teaming
2
+
3
+ ## Table of Contents
4
+
5
+ 1. [Overview](#overview)
6
+ 2. [MITRE ATT&CK Framework Integration](#mitre-attck-framework-integration)
7
+ - 14 ATT&CK Tactics
8
+ - Using ATT&CK for Red Teaming
9
+ 3. [7-Phase Cybersecurity Red Team Methodology](#7-phase-cybersecurity-red-team-methodology)
10
+ - Phase 1: Intelligence Gathering
11
+ - Phase 2: Vulnerability Detection
12
+ - Phase 3: Exploitation & Initial Access
13
+ - Phase 4: Lateral Movement
14
+ - Phase 5: Privilege Escalation
15
+ - Phase 6: Persistence
16
+ - Phase 7: Objective Achievement & Reporting
17
+ 4. [Purple Team Practices](#purple-team-practices)
18
+ 5. [Tools & Frameworks](#tools--frameworks)
19
+ 6. [Critical Reminders](#critical-reminders)
20
+
21
+ ## Overview
22
+
23
+ This reference provides detailed methodology for traditional cybersecurity red teaming, focusing on network penetration, infrastructure compromise, and adversary emulation using the MITRE ATT&CK framework.
24
+
25
+ ## MITRE ATT&CK Framework Integration
26
+
27
+ ### What is MITRE ATT&CK?
28
+
29
+ MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a globally-accessible knowledge base of adversary behaviors based on real-world observations.
30
+
31
+ **Components:**
32
+ - **Tactics**: "Why" - Tactical goals (e.g., Initial Access, Persistence, Privilege Escalation)
33
+ - **Techniques**: "How" - Methods to achieve tactics (e.g., Spear Phishing, DLL Injection)
34
+ - **Procedures**: Technical implementation details (specific commands, tools)
35
+
36
+ ### 14 ATT&CK Tactics
37
+
38
+ 1. **Reconnaissance**: Gather information to plan operations
39
+ 2. **Resource Development**: Establish resources for operations (infrastructure, tools)
40
+ 3. **Initial Access**: Gain foothold in target network
41
+ 4. **Execution**: Run malicious code
42
+ 5. **Persistence**: Maintain access across reboots/credential changes
43
+ 6. **Privilege Escalation**: Gain higher-level permissions
44
+ 7. **Defense Evasion**: Avoid detection by security tools
45
+ 8. **Credential Access**: Steal usernames, passwords, tokens
46
+ 9. **Discovery**: Learn about internal environment
47
+ 10. **Lateral Movement**: Move through victim network
48
+ 11. **Collection**: Gather data of interest
49
+ 12. **Command & Control**: Communicate with compromised systems
50
+ 13. **Exfiltration**: Steal data from network
51
+ 14. **Impact**: Disrupt availability, integrity, or data destruction
52
+
53
+ ### Using ATT&CK for Red Teaming
54
+
55
+ **Step 1: Select Target APT Group**
56
+ - Identify adversary groups relevant to your industry
57
+ - MITRE maintains profiles for 130+ APT groups
58
+ - Example: APT28 (Fancy Bear), APT29 (Cozy Bear), APT3
59
+
60
+ **Step 2: Map TTPs to Red Team Plan**
61
+ - Use MITRE ATT&CK Navigator (web-based visualization tool)
62
+ - Create layers mapping APT group TTPs to your operation
63
+ - Prioritize techniques based on detection coverage gaps
64
+
65
+ **Step 3: Emulate Adversary Behavior**
66
+ - Use tools like Atomic Red Team for pre-built technique tests
67
+ - Execute ATT&CK techniques in realistic sequence
68
+ - Document which techniques succeed vs. detected
69
+
70
+ **Step 4: Measure Detection Coverage**
71
+ - Mark techniques as: Detected (green), Partially Detected (yellow), Missed (red)
72
+ - Identify blind spots in security monitoring
73
+ - Provide heat map to blue team
74
+
75
+ ## 7-Phase Cybersecurity Red Team Methodology
76
+
77
+ ### Phase 1: Intelligence Gathering
78
+
79
+ **Objectives:**
80
+ - Build comprehensive target profile
81
+ - Identify attack surface
82
+ - Map technology stack
83
+
84
+ **OSINT Techniques:**
85
+ - **Domain Intelligence**: WHOIS, DNS records, subdomains (Sublist3r, Amass)
86
+ - **Network Intelligence**: Shodan, Censys for exposed services
87
+ - **Employee Intelligence**: LinkedIn, social media for org chart and technology mentions
88
+ - **Technology Stack**: Wappalyzer, BuiltWith, job postings
89
+ - **Document Metadata**: ExifTool for leaked files
90
+ - **Code Repositories**: GitHub for exposed credentials, architectural insights
91
+
92
+ **Active Reconnaissance:**
93
+ - **Network Scanning**: Nmap for port discovery and service enumeration
94
+ - **Web Application Mapping**: Burp Suite, OWASP ZAP
95
+ - **Email Harvesting**: theHarvester, Hunter.io
96
+
97
+ **Deliverable:** Intelligence report with target profile, asset inventory, initial attack vectors
98
+
99
+ ### Phase 2: Vulnerability Detection
100
+
101
+ **Objectives:**
102
+ - Identify weaknesses in perimeter and internal systems
103
+ - Prioritize high-impact vulnerabilities
104
+ - Map vulnerabilities to ATT&CK techniques
105
+
106
+ **Technical Scanning:**
107
+ - **Network Vulnerability Scanners**: Nessus, OpenVAS, Qualys
108
+ - **Web Application Scanners**: Burp Suite Pro, Acunetix
109
+ - **Configuration Audits**: CIS benchmarks, security misconfigurations
110
+ - **Credential Stuffing**: Test for weak/default credentials
111
+
112
+ **Manual Testing:**
113
+ - **Authentication Bypass**: Logic flaws in login mechanisms
114
+ - **Injection Vulnerabilities**: SQL injection, command injection
115
+ - **Business Logic Flaws**: Privilege escalation, horizontal authorization bypass
116
+ - **API Security**: Broken object level authorization, excessive data exposure
117
+
118
+ **Vulnerability Prioritization:**
119
+ - **CVSS Score**: Technical severity rating
120
+ - **Exploitability**: Public exploits available? Exploit complexity?
121
+ - **Business Impact**: What data/systems are at risk?
122
+ - **Detection Likelihood**: Will exploit trigger alarms?
123
+
124
+ **Deliverable:** Prioritized vulnerability report with exploitation feasibility assessment
125
+
126
+ ### Phase 3: Exploitation & Initial Access
127
+
128
+ **Objectives:**
129
+ - Gain foothold in target network
130
+ - Establish command & control (C2)
131
+ - Begin lateral movement preparation
132
+
133
+ **Common Initial Access Vectors:**
134
+
135
+ **External Exploitation:**
136
+ - **Web Application Exploits**: SQL injection, RCE, file upload vulnerabilities
137
+ - **VPN/RAS Exploits**: Pulse Secure, Citrix, Fortinet vulnerabilities
138
+ - **Email Server Exploits**: Exchange ProxyShell, ProxyLogon
139
+
140
+ **Phishing & Social Engineering:**
141
+ - **Spear Phishing**: Targeted emails with malicious attachments/links
142
+ - **Credential Harvesting**: Fake login pages to steal credentials
143
+ - **Watering Hole**: Compromise websites target employees visit
144
+ - **Pretexting**: Phone calls to helpdesk for password resets
145
+
146
+ **Physical Access:**
147
+ - **Badge Cloning**: RFID duplication for building access
148
+ - **Tailgating**: Follow authorized personnel into secure areas
149
+ - **USB Drops**: Plant USB Rubber Ducky with payload
150
+
151
+ **Exploitation Frameworks:**
152
+ - **Metasploit**: Comprehensive exploit database and post-exploitation
153
+ - **Cobalt Strike**: Commercial C2 platform (legitimate red team tool)
154
+ - **Empire/Starkiller**: PowerShell and Python post-exploitation framework
155
+ - **Sliver**: Open-source C2 framework
156
+
157
+ **Establishing C2:**
158
+ - **HTTP/HTTPS**: Blend with normal traffic
159
+ - **DNS Tunneling**: Exfiltrate data via DNS queries
160
+ - **Social Media**: Use Twitter/Telegram APIs for C2 (covert channel)
161
+ - **Cloud Services**: Dropbox, Google Drive for staging/exfiltration
162
+
163
+ **Deliverable:** Successful access to target network with C2 established
164
+
165
+ ### Phase 4: Lateral Movement
166
+
167
+ **Objectives:**
168
+ - Move from initial foothold to high-value targets
169
+ - Avoid detection during network traversal
170
+ - Map internal network topology
171
+
172
+ **Lateral Movement Techniques:**
173
+
174
+ **Credential-Based Movement:**
175
+ - **Pass-the-Hash**: Authenticate using NTLM hash (Mimikatz)
176
+ - **Pass-the-Ticket**: Kerberos ticket reuse
177
+ - **Credential Dumping**: LSASS memory, SAM database, NTDS.dit
178
+ - **Kerberoasting**: Extract and crack service account hashes
179
+
180
+ **Exploitation-Based Movement:**
181
+ - **SMB Exploits**: EternalBlue (MS17-010), SMBGhost
182
+ - **RDP Exploits**: BlueKeep (CVE-2019-0708)
183
+ - **Remote Code Execution**: PSExec, WMI, WinRM
184
+
185
+ **Living-Off-the-Land (LOLBins):**
186
+ - **PowerShell**: Execute scripts in memory, avoid disk-based detection
187
+ - **WMI (Windows Management Instrumentation)**: Remote command execution
188
+ - **PsExec**: Sysinternals tool for lateral movement
189
+ - **DCOM**: Distributed COM for remote execution
190
+
191
+ **Internal Reconnaissance:**
192
+ - **Active Directory Enumeration**: BloodHound for AD attack paths
193
+ - **Network Scanning**: Discover additional hosts and services
194
+ - **Share Enumeration**: Find sensitive data in file shares
195
+ - **Service Account Discovery**: Identify high-privilege accounts
196
+
197
+ **Deliverable:** Network topology map with compromised hosts and privilege levels
198
+
199
+ ### Phase 5: Privilege Escalation
200
+
201
+ **Objectives:**
202
+ - Gain administrative/root access
203
+ - Compromise domain administrator accounts
204
+ - Full control of critical infrastructure
205
+
206
+ **Windows Privilege Escalation:**
207
+ - **Unquoted Service Paths**: DLL hijacking in service paths
208
+ - **Weak Service Permissions**: Modify service binaries or configuration
209
+ - **Token Impersonation**: Rotten Potato, Juicy Potato
210
+ - **Kernel Exploits**: CVE-based privilege escalation
211
+ - **UAC Bypass**: User Account Control evasion
212
+
213
+ **Linux Privilege Escalation:**
214
+ - **SUID Binaries**: Exploit set-UID programs for root access
215
+ - **Kernel Exploits**: Dirty COW, local privilege escalation vulnerabilities
216
+ - **Sudo Misconfigurations**: NOPASSWD entries, wildcards
217
+ - **Cron Jobs**: Writable scripts executed as root
218
+ - **Capabilities**: Abuse Linux capabilities (e.g., CAP_SYS_ADMIN)
219
+
220
+ **Active Directory Attacks:**
221
+ - **Golden Ticket**: Forge Kerberos TGTs with KRBTGT hash
222
+ - **Silver Ticket**: Forge service tickets for specific services
223
+ - **DCSync**: Replicate Active Directory credentials
224
+ - **AdminSDHolder**: Persist via Protected Groups
225
+
226
+ **Deliverable:** Domain administrator or root-level access to critical systems
227
+
228
+ ### Phase 6: Persistence
229
+
230
+ **Objectives:**
231
+ - Maintain access through reboots, credential changes
232
+ - Install multiple backdoors for redundancy
233
+ - Ensure covert long-term access
234
+
235
+ **Persistence Techniques:**
236
+
237
+ **Windows Persistence:**
238
+ - **Registry Run Keys**: HKLM/HKCU Run, RunOnce
239
+ - **Scheduled Tasks**: Trigger malicious payloads at intervals
240
+ - **Services**: Install malicious Windows services
241
+ - **WMI Event Subscriptions**: Execute code on WMI events
242
+ - **DLL Hijacking**: Replace legitimate DLLs with malicious versions
243
+
244
+ **Linux Persistence:**
245
+ - **SSH Keys**: Add public keys to `~/.ssh/authorized_keys`
246
+ - **Cron Jobs**: Schedule malicious scripts
247
+ - **Init Scripts**: `/etc/init.d/` or systemd services
248
+ - **LD_PRELOAD**: Inject shared libraries into processes
249
+ - **Web Shells**: Upload PHP/JSP shells to web servers
250
+
251
+ **Covert Persistence:**
252
+ - **Implants in Memory**: Fileless malware (e.g., Metasploit's Meterpreter)
253
+ - **Firmware Backdoors**: BIOS/UEFI rootkits
254
+ - **Supply Chain**: Compromise software update mechanisms
255
+
256
+ **Deliverable:** Multiple covert backdoors ensuring persistent access
257
+
258
+ ### Phase 7: Objective Achievement & Reporting
259
+
260
+ **Objectives:**
261
+ - Accomplish defined red team goals (data exfiltration, system compromise)
262
+ - Document attack chain with evidence
263
+ - Provide comprehensive remediation guidance
264
+
265
+ **Common Objectives:**
266
+ - **Data Exfiltration**: Steal sensitive data (customer records, financial data, IP)
267
+ - **Ransomware Simulation**: Encrypt files (simulation only, no actual damage)
268
+ - **Domain Dominance**: Full control of Active Directory
269
+ - **Physical Control**: Gain access to secure facilities
270
+
271
+ **Evidence Collection:**
272
+ - **Screenshots**: Every critical step with timestamps
273
+ - **Log Files**: C2 logs, exploitation outputs
274
+ - **Proof of Compromise**: "Owned" files, screenshots of sensitive data access
275
+ - **Network Traffic Captures**: PCAP files showing attack traffic
276
+
277
+ **Reporting Structure:**
278
+ - **Executive Summary**
279
+ - Business impact assessment
280
+ - High-level risk scoring
281
+ - Key findings (3-5 critical vulnerabilities)
282
+ - Remediation timeline recommendations
283
+
284
+ - **Technical Findings**
285
+ - Attack chain diagram (visual representation)
286
+ - Detailed vulnerability descriptions
287
+ - Exploitation procedures and evidence
288
+ - MITRE ATT&CK mapping
289
+
290
+ - **Remediation Recommendations**
291
+ - Prioritized by risk (Critical → High → Medium → Low)
292
+ - Specific, actionable steps
293
+ - Detection improvements for blue team
294
+ - Long-term architectural recommendations
295
+
296
+ - **Indicators of Compromise (IOCs)**
297
+ - IP addresses used
298
+ - Tools and signatures
299
+ - Techniques observable in logs
300
+ - Blue team detection guidance
301
+
302
+ **Deliverable:** Comprehensive red team report with attack evidence and remediation roadmap
303
+
304
+ ## Purple Team Practices
305
+
306
+ ### What is Purple Teaming?
307
+
308
+ Purple teaming is collaborative security testing where red team (attackers) and blue team (defenders) work together openly, sharing knowledge in real-time to improve organizational security.
309
+
310
+ **Key Differences from Red Teaming:**
311
+ - **Red Team**: Covert, adversarial, blue team unaware
312
+ - **Purple Team**: Collaborative, blue team aware, knowledge sharing
313
+
314
+ ### Purple Team Workflow
315
+
316
+ **Phase 1: Planning Together**
317
+ - Red and blue teams jointly define objectives
318
+ - Select ATT&CK techniques to test
319
+ - Blue team prepares detection hypotheses
320
+
321
+ **Phase 2: Controlled Attack Execution**
322
+ - Red team executes technique
323
+ - Blue team monitors detection systems in real-time
324
+ - Immediate feedback: "Did you see that?"
325
+
326
+ **Phase 3: Detection Tuning**
327
+ - If detected: Document successful detection
328
+ - If missed: Blue team creates new detection rule
329
+ - Re-test until reliable detection achieved
330
+
331
+ **Phase 4: Knowledge Transfer**
332
+ - Red team explains attacker tradecraft
333
+ - Blue team shares detection engineering insights
334
+ - Document lessons learned
335
+
336
+ ### Purple Team Benefits
337
+ - Accelerates blue team skill development
338
+ - Validates detection coverage quickly
339
+ - Reduces time between detection gaps and fixes
340
+ - Fosters collaboration vs. adversarial culture
341
+
342
+ ## Tools & Frameworks
343
+
344
+ ### Command & Control (C2) Frameworks
345
+ - **Cobalt Strike**: Commercial, widely-used by red teams and APTs
346
+ - **Sliver**: Open-source, modern C2 with strong encryption
347
+ - **Empire**: PowerShell/Python post-exploitation framework
348
+ - **Mythic**: Collaborative C2 framework with web UI
349
+
350
+ ### Adversary Emulation
351
+ - **Atomic Red Team**: Pre-built ATT&CK technique tests (Red Canary)
352
+ - **CALDERA**: Automated adversary emulation (MITRE)
353
+ - **APT Simulator**: Batch scripts simulating APT behavior
354
+
355
+ ### Exploitation Frameworks
356
+ - **Metasploit**: Comprehensive exploit database
357
+ - **Covenant**: .NET C2 framework
358
+ - **Merlin**: Go-based post-exploitation platform
359
+
360
+ ### Credential Attacks
361
+ - **Mimikatz**: Extract plaintext passwords, hashes, Kerberos tickets
362
+ - **BloodHound**: Active Directory attack path mapping
363
+ - **Rubeus**: Kerberos abuse toolkit
364
+ - **Impacket**: Python classes for network protocols
365
+
366
+ ### Phishing & Social Engineering
367
+ - **Gophish**: Open-source phishing framework
368
+ - **Social-Engineer Toolkit (SET)**: Phishing, credential harvesting
369
+ - **EvilNginx**: Adversary-in-the-middle phishing framework
370
+
371
+ ### OSINT & Reconnaissance
372
+ - **theHarvester**: Email, domain, subdomain enumeration
373
+ - **Shodan**: Search engine for internet-connected devices
374
+ - **Amass**: DNS enumeration and network mapping (OWASP)
375
+ - **SpiderFoot**: Automated OSINT collection
376
+
377
+ ## Critical Reminders
378
+
379
+ - **MITRE ATT&CK is the Standard**: Map all activities to ATT&CK for interoperability
380
+ - **Stealth is Key**: Avoid detection to test realistic adversary scenarios
381
+ - **Document Everything**: Comprehensive evidence is essential for value delivery
382
+ - **Purple Team for Learning**: Collaborative exercises accelerate organizational improvement
383
+ - **Authorization First**: Never conduct red team activities without explicit written authorization