ATTACKIFY has a large library of individualized attack modules based off the TACTICS, TECHNIQUES and PROCEDURES seen in APT threat actors. You can refine detection and improve monitoring abilities by continuosly running modules over and over.
Some of these modules include tactics, techniques and procedures of the following:
Validate endpoint security controls and perform a number of compliance checks to ensure systems are securely configured.
more infoSelect from a number of modules to simulate ransomware behaviour on endpoints and communication over networks.
more infoSelect from a number of modules to simulate ransomware behaviour on endpoints and communication over networks.
more info