ATTACKIFY has a large library of individualized attack modules based off the TACTICS, TECHNIQUES and PROCEDURES seen in APT threat actors. You can refine detection and improve monitoring abilities by continuosly running modules over and over.
Some of these modules include tactics, techniques and procedures of the following:
Exfiltration modules allow you to discover various techniques that can be used to exfiltrate sensitive data from within the organization to external C2's. Discover which services, ports and protcols can bypass your DLP solutions.
more info