ATTACKIFY





Discovery techniques allow attackers to fingerprint environments & better understand the environment they are moving through. These modules emulate numerous techniques.

Discovery Modules

Discovery techniques allow attackers to fingerprint systems and networks to better understand the environment they are moving through. ATTACKIFY provides a number of modules that simulate various methods used by attackers:

  • Network share discovery
  • Enumerating Domain and LDAP servers
  • Discover Active Window Titles
  • Port scanning
  • Packet Capture
  • Domain User Enumeration
  • Virtualized Environment Detections

Related Modules

Security Controls

Validate endpoint security controls and perform a number of compliance checks to ensure systems are securely configured.

more info

Phishing

Usually phishing / spearphishing is the first approach by which adversaries attempt to gain initial access to an organizations environment.

more info

Malware

Simulate malware and common malicious functionality as seen in various malware and adverserial techniques. SAFELY execute suspicous functionality and API calls in the same way malware does!

more info