{"id":10479,"date":"2020-05-04T19:08:32","date_gmt":"2020-05-04T13:38:32","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=10479"},"modified":"2020-05-04T19:08:32","modified_gmt":"2020-05-04T13:38:32","slug":"elemental","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/elemental\/","title":{"rendered":"Elemental : An ATT&#038;CK Threat Library"},"content":{"rendered":"\n<p><strong>Elemental <\/strong>is a centralized threat library of MITRE ATT&amp;CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It provides an alternative way to explore the ATT&amp;CK dataset, mapping relevant Atomic Red Team tests and Sigma rules to their respective technique. <\/p>\n\n\n\n<p>It allows defenders to create custom ATT&amp;CK Techniques and&nbsp;upload Sigma Rules. The ATT&amp;CK dataset was collected via the hunters-forge attackcti Python client. Atomic Red Team tests were imported from the Atomic Red Team GitHub repository. Sigma rules were imported from Sigma&#8217;s GitHub rule collection if they contained ATT&amp;CK tags.<\/p>\n\n\n\n<p>This platform was conceived as a capstone project for University of California Berkeley&#8217;s Master of Information and Cybersecurity program. We look forward to community feedback for new ideas and improvements. <\/p>\n\n\n\n<p>This instance of Elemental is experimental and not configured for production deployment. Please see Django documentation on configuring a production server.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>View ATT&amp;CK Technique information<\/li><li>View Atomic Red Team tests in Markdown and Yaml<\/li><li>View Sigma rules in Yaml<\/li><li>Add new ATT&amp;CK Techniques (currently only available from Django Admin panel)<\/li><li>Upload new Sigma rules (currently only available from Django Admin panel)<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">$<strong>git clone <a href=\"https:\/\/github.com\/Elemental-attack\/Elemental.git\">https:\/\/github.com\/Elemental-attack\/Elemental.git<\/a><br>$cd Elemental\/elemental<br>$pip install -r requirements.txt<br>$python manage.py runserver<br>$Default Django admin page crendentials: user: elemental | password: berkelium<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/should-i-trust\/\" target=\"_blank\" rel=\"noreferrer noopener\">Should-I-Trust : OSINT Tool To Evaluate Trustworthiness Of A Company<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Screenshots<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Main Elements View<\/strong><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-uJVTValibxw\/Xq7Sfd74AQI\/AAAAAAAAGIw\/cG7NDFdrsXUpN71skvbOqrO1YreD4LyaACLcBGAsYHQ\/s1600\/Screenshots-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Technique View<\/strong><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-tH99ZKSJx_M\/Xq7SX8zJmnI\/AAAAAAAAGIo\/YeH2VJ4sZZodcpj6KjeQD8btWgjdqLJPgCLcBGAsYHQ\/s1600\/Screenshots-2.png\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Atomics View<\/strong><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-F-nrYfbNDTU\/Xq7SfgyU97I\/AAAAAAAAGIs\/u10JwHfZfAMzzp46SIZvatl3Ls84BvLpACLcBGAsYHQ\/s1600\/Screenshots-3.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-lExWA9dkEB0\/Xq7SiI19lSI\/AAAAAAAAGI0\/mo0z3wqtlAgdQsDbEJs11LEUW0FNjNIRwCLcBGAsYHQ\/s1600\/Screenshots-4.png\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Sigma Rules View<\/strong><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-dhzuqyW7rdg\/Xq7Skjm8GcI\/AAAAAAAAGI4\/khjnMQ1heA8afXnh_OFVVI8b3QcLMES2wCLcBGAsYHQ\/s1600\/Screenshots-5.png\" alt=\"\"\/><\/figure>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/Elemental-attack\/Elemental\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Elemental is a centralized threat library of MITRE ATT&amp;CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It provides an alternative way to explore the ATT&amp;CK dataset, mapping relevant Atomic Red Team tests and Sigma rules to their respective technique. It allows defenders to create custom ATT&amp;CK Techniques and&nbsp;upload Sigma Rules. The ATT&amp;CK [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16279,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png","fifu_image_alt":"Elemental : An ATT&CK Threat Library","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[258,1020],"class_list":["post-10479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-attck","tag-elemental"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Elemental : An ATT&amp;CK Threat Library!Kalilinuxtutorials<\/title>\n<meta name=\"description\" content=\"Elemental is a centralized threat library of MITRE ATT&amp;CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It provides an alternative\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/elemental\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Elemental : An ATT&amp;CK Threat Library!Kalilinuxtutorials\" \/>\n<meta property=\"og:description\" content=\"Elemental is a centralized threat library of MITRE ATT&amp;CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It provides an alternative\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/elemental\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-04T13:38:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/elemental\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/elemental\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Elemental : An ATT&#038;CK Threat Library\",\"datePublished\":\"2020-05-04T13:38:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/elemental\/\"},\"wordCount\":260,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/elemental\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png\",\"keywords\":[\"ATT&amp;CK\",\"Elemental\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/elemental\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/elemental\/\",\"name\":\"Elemental : An ATT&CK Threat Library!Kalilinuxtutorials\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/elemental\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/elemental\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png\",\"datePublished\":\"2020-05-04T13:38:32+00:00\",\"description\":\"Elemental is a centralized threat library of MITRE ATT&CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It provides an alternative\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/elemental\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/elemental\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Elemental : An ATT&CK Threat Library!Kalilinuxtutorials","description":"Elemental is a centralized threat library of MITRE ATT&CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It provides an alternative","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/elemental\/","og_locale":"en_US","og_type":"article","og_title":"Elemental : An ATT&CK Threat Library!Kalilinuxtutorials","og_description":"Elemental is a centralized threat library of MITRE ATT&CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It provides an alternative","og_url":"https:\/\/kalilinuxtutorials.com\/elemental\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-05-04T13:38:32+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/elemental\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/elemental\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Elemental : An ATT&#038;CK Threat Library","datePublished":"2020-05-04T13:38:32+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/elemental\/"},"wordCount":260,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/elemental\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png","keywords":["ATT&amp;CK","Elemental"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/elemental\/","url":"https:\/\/kalilinuxtutorials.com\/elemental\/","name":"Elemental : An ATT&CK Threat Library!Kalilinuxtutorials","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/elemental\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/elemental\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png","datePublished":"2020-05-04T13:38:32+00:00","description":"Elemental is a centralized threat library of MITRE ATT&CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It provides an alternative","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/elemental\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/elemental\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-bs5-v5MdEVc\/Xq7STCk00aI\/AAAAAAAAGIk\/rt_Zwzo5ig4nActhovwOBHhKnh23n_evwCLcBGAsYHQ\/s1600\/Elemental%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":36850,"url":"https:\/\/kalilinuxtutorials.com\/atomic-red-team\/","url_meta":{"origin":10479,"position":0},"title":"Atomic Red Team : Mastering Threat Simulations For Advanced Security Testing","author":"Varshini","date":"March 5, 2025","format":false,"excerpt":"The Atomic Red Team is an open-source framework designed to help security teams emulate adversarial tactics and techniques in alignment with the MITRE ATT&CK\u00ae framework. Developed by Red Canary, it provides a library of small, portable detection tests, known as \"atomics,\" that can be executed to assess the effectiveness of\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Atomic-Red-Team.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Atomic-Red-Team.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Atomic-Red-Team.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Atomic-Red-Team.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Atomic-Red-Team.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Atomic-Red-Team.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35268,"url":"https:\/\/kalilinuxtutorials.com\/stratus-red-team\/","url_meta":{"origin":10479,"position":1},"title":"Stratus Red Team &#8211; Advancing Threat Detection And Offensive Testing In Cloud Environments","author":"Varshini","date":"November 25, 2024","format":false,"excerpt":"Stratus Red Team is a cutting-edge tool designed to enhance cloud security by simulating granular attack techniques in live environments. Inspired by Atomic Red Team\u2122, it focuses exclusively on cloud-based scenarios, allowing security teams to validate and refine their threat detection capabilities. This self-contained binary enables users to detonate specific\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhCljwuRFKOnGFqkFU2Ka3cZ2dtIFTTKV0uYD-fXtYVJHIHToT02wctusiryhsRD026AsgmrdLYZ8EsJmk-Qyrk6QTO2WA11C-ks8xezcIF6g58z7AorRdnC7vjzCzhgzI6W7_uVxdAkbfYqjmWcQwm7bDOvZ3E0-9HCKfGXI0eRHMTFai4GSeRxNHzqQIF\/s1600\/Stratus%20Red%20Team%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhCljwuRFKOnGFqkFU2Ka3cZ2dtIFTTKV0uYD-fXtYVJHIHToT02wctusiryhsRD026AsgmrdLYZ8EsJmk-Qyrk6QTO2WA11C-ks8xezcIF6g58z7AorRdnC7vjzCzhgzI6W7_uVxdAkbfYqjmWcQwm7bDOvZ3E0-9HCKfGXI0eRHMTFai4GSeRxNHzqQIF\/s1600\/Stratus%20Red%20Team%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhCljwuRFKOnGFqkFU2Ka3cZ2dtIFTTKV0uYD-fXtYVJHIHToT02wctusiryhsRD026AsgmrdLYZ8EsJmk-Qyrk6QTO2WA11C-ks8xezcIF6g58z7AorRdnC7vjzCzhgzI6W7_uVxdAkbfYqjmWcQwm7bDOvZ3E0-9HCKfGXI0eRHMTFai4GSeRxNHzqQIF\/s1600\/Stratus%20Red%20Team%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhCljwuRFKOnGFqkFU2Ka3cZ2dtIFTTKV0uYD-fXtYVJHIHToT02wctusiryhsRD026AsgmrdLYZ8EsJmk-Qyrk6QTO2WA11C-ks8xezcIF6g58z7AorRdnC7vjzCzhgzI6W7_uVxdAkbfYqjmWcQwm7bDOvZ3E0-9HCKfGXI0eRHMTFai4GSeRxNHzqQIF\/s1600\/Stratus%20Red%20Team%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhCljwuRFKOnGFqkFU2Ka3cZ2dtIFTTKV0uYD-fXtYVJHIHToT02wctusiryhsRD026AsgmrdLYZ8EsJmk-Qyrk6QTO2WA11C-ks8xezcIF6g58z7AorRdnC7vjzCzhgzI6W7_uVxdAkbfYqjmWcQwm7bDOvZ3E0-9HCKfGXI0eRHMTFai4GSeRxNHzqQIF\/s1600\/Stratus%20Red%20Team%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhCljwuRFKOnGFqkFU2Ka3cZ2dtIFTTKV0uYD-fXtYVJHIHToT02wctusiryhsRD026AsgmrdLYZ8EsJmk-Qyrk6QTO2WA11C-ks8xezcIF6g58z7AorRdnC7vjzCzhgzI6W7_uVxdAkbfYqjmWcQwm7bDOvZ3E0-9HCKfGXI0eRHMTFai4GSeRxNHzqQIF\/s1600\/Stratus%20Red%20Team%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":26028,"url":"https:\/\/kalilinuxtutorials.com\/sentinel-attack\/","url_meta":{"origin":10479,"position":2},"title":"Sentinel-Attack : Tools To Rapidly Deploy A Threat Hunting Capability On Azure Sentinel","author":"R K","date":"July 19, 2022","format":false,"excerpt":"Sentinel ATT&CK aims to simplify the rapid deployment of a threat hunting capability that leverages Sysmon and\u00a0MITRE ATT&CK\u00a0on Azure Sentinel Overview Sentinel ATT&CK provides the following tools: An\u00a0ARM template\u00a0to automatically deploy Sentinel ATT&CK to your Azure environmentA\u00a0Sysmon configuration file\u00a0compatible with Azure Sentinel and mapped to specific ATT&CK techniquesA\u00a0Sysmon log parser\u00a0mapped\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTXEQdIjK0V2pstaMj3C8s-2NJJscwQkPdz4iVqxjfjv1XUtg627LPaNKjoWgHwI_FPxRqVLnUCAkrYkhOQGyZWR-uR9L6SA6RJ9GEmNIKlcZBCA55aUKjhI_0GHbGy3BhI4HX-i_2EBEIi7gaQy8rRDDWfAqzz2v2lnHmIrrNpUFiY4YZa-fTLCDW\/s728\/FWusfANXEAAuJaj.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTXEQdIjK0V2pstaMj3C8s-2NJJscwQkPdz4iVqxjfjv1XUtg627LPaNKjoWgHwI_FPxRqVLnUCAkrYkhOQGyZWR-uR9L6SA6RJ9GEmNIKlcZBCA55aUKjhI_0GHbGy3BhI4HX-i_2EBEIi7gaQy8rRDDWfAqzz2v2lnHmIrrNpUFiY4YZa-fTLCDW\/s728\/FWusfANXEAAuJaj.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTXEQdIjK0V2pstaMj3C8s-2NJJscwQkPdz4iVqxjfjv1XUtg627LPaNKjoWgHwI_FPxRqVLnUCAkrYkhOQGyZWR-uR9L6SA6RJ9GEmNIKlcZBCA55aUKjhI_0GHbGy3BhI4HX-i_2EBEIi7gaQy8rRDDWfAqzz2v2lnHmIrrNpUFiY4YZa-fTLCDW\/s728\/FWusfANXEAAuJaj.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTXEQdIjK0V2pstaMj3C8s-2NJJscwQkPdz4iVqxjfjv1XUtg627LPaNKjoWgHwI_FPxRqVLnUCAkrYkhOQGyZWR-uR9L6SA6RJ9GEmNIKlcZBCA55aUKjhI_0GHbGy3BhI4HX-i_2EBEIi7gaQy8rRDDWfAqzz2v2lnHmIrrNpUFiY4YZa-fTLCDW\/s728\/FWusfANXEAAuJaj.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":30496,"url":"https:\/\/kalilinuxtutorials.com\/attackgen\/","url_meta":{"origin":10479,"position":3},"title":"AttackGen &#8211; Tailored Cyber Incident Response Testing","author":"Varshini","date":"September 27, 2023","format":false,"excerpt":"AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details. Table Of Contents Star the Repo Features Releases Requirements Installation Data\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgQWDLuW4xeHnY_EvEdNe_cNUIT6pF3mOPvkhx5eg5ODpn2dth9WSdG-3bxIy_83sHRe15M7N3qDLMqaWa9pVe4oPpzvNGhMMlf6WGTA4zVEqiAVuVCI0I2bJyeqsU_N4-i1JIf2Kg8Kf00OYiA8xID65uX2VMJHxcpm4QWBJDo4A56x7PPoY6LGOZ_mA\/s16000\/AttackGen.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgQWDLuW4xeHnY_EvEdNe_cNUIT6pF3mOPvkhx5eg5ODpn2dth9WSdG-3bxIy_83sHRe15M7N3qDLMqaWa9pVe4oPpzvNGhMMlf6WGTA4zVEqiAVuVCI0I2bJyeqsU_N4-i1JIf2Kg8Kf00OYiA8xID65uX2VMJHxcpm4QWBJDo4A56x7PPoY6LGOZ_mA\/s16000\/AttackGen.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgQWDLuW4xeHnY_EvEdNe_cNUIT6pF3mOPvkhx5eg5ODpn2dth9WSdG-3bxIy_83sHRe15M7N3qDLMqaWa9pVe4oPpzvNGhMMlf6WGTA4zVEqiAVuVCI0I2bJyeqsU_N4-i1JIf2Kg8Kf00OYiA8xID65uX2VMJHxcpm4QWBJDo4A56x7PPoY6LGOZ_mA\/s16000\/AttackGen.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgQWDLuW4xeHnY_EvEdNe_cNUIT6pF3mOPvkhx5eg5ODpn2dth9WSdG-3bxIy_83sHRe15M7N3qDLMqaWa9pVe4oPpzvNGhMMlf6WGTA4zVEqiAVuVCI0I2bJyeqsU_N4-i1JIf2Kg8Kf00OYiA8xID65uX2VMJHxcpm4QWBJDo4A56x7PPoY6LGOZ_mA\/s16000\/AttackGen.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgQWDLuW4xeHnY_EvEdNe_cNUIT6pF3mOPvkhx5eg5ODpn2dth9WSdG-3bxIy_83sHRe15M7N3qDLMqaWa9pVe4oPpzvNGhMMlf6WGTA4zVEqiAVuVCI0I2bJyeqsU_N4-i1JIf2Kg8Kf00OYiA8xID65uX2VMJHxcpm4QWBJDo4A56x7PPoY6LGOZ_mA\/s16000\/AttackGen.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgQWDLuW4xeHnY_EvEdNe_cNUIT6pF3mOPvkhx5eg5ODpn2dth9WSdG-3bxIy_83sHRe15M7N3qDLMqaWa9pVe4oPpzvNGhMMlf6WGTA4zVEqiAVuVCI0I2bJyeqsU_N4-i1JIf2Kg8Kf00OYiA8xID65uX2VMJHxcpm4QWBJDo4A56x7PPoY6LGOZ_mA\/s16000\/AttackGen.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35282,"url":"https:\/\/kalilinuxtutorials.com\/mitre-attck-evaluations-and-must-have-intelligence-for-security-leaders\/","url_meta":{"origin":10479,"position":4},"title":"MITRE ATT&amp;CK Evaluations And Must-Have Intelligence For Security Leaders","author":"Balaji N","date":"November 25, 2024","format":false,"excerpt":"In today\u2019s dynamic threat landscape, security leaders are under constant pressure to make informed choices about which solutions and strategies they employ to protect their organizations. The \u201cMITRE Engenuity ATT&CK\u00a0Evaluations (PDF Guide): Enterprise\u201d stand out as an essential resource for cybersecurity decision makers to navigate this challenge. Unlike other independent\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"MITRE ATT&amp;CK Evaluations","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhU17q4Mb_rWmKqoplOVS6CrcdTfGn3yMKsWTpo9pLIuzLUPniEQyOdV_7ANe_dq5O9bitDvGmDCHGz3PQuHrR596Tml6QMGKNc8r8iU8jrOoj4BAQBQ3ul25SGlukCIVJn0cDaoo9ZAu0PKk0BNIG4b-BwkbeliDYewTE2uVvTO_kET3fW4fOr4YHIkpTj\/s16000\/mitre%20attack%20evaluation.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhU17q4Mb_rWmKqoplOVS6CrcdTfGn3yMKsWTpo9pLIuzLUPniEQyOdV_7ANe_dq5O9bitDvGmDCHGz3PQuHrR596Tml6QMGKNc8r8iU8jrOoj4BAQBQ3ul25SGlukCIVJn0cDaoo9ZAu0PKk0BNIG4b-BwkbeliDYewTE2uVvTO_kET3fW4fOr4YHIkpTj\/s16000\/mitre%20attack%20evaluation.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhU17q4Mb_rWmKqoplOVS6CrcdTfGn3yMKsWTpo9pLIuzLUPniEQyOdV_7ANe_dq5O9bitDvGmDCHGz3PQuHrR596Tml6QMGKNc8r8iU8jrOoj4BAQBQ3ul25SGlukCIVJn0cDaoo9ZAu0PKk0BNIG4b-BwkbeliDYewTE2uVvTO_kET3fW4fOr4YHIkpTj\/s16000\/mitre%20attack%20evaluation.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhU17q4Mb_rWmKqoplOVS6CrcdTfGn3yMKsWTpo9pLIuzLUPniEQyOdV_7ANe_dq5O9bitDvGmDCHGz3PQuHrR596Tml6QMGKNc8r8iU8jrOoj4BAQBQ3ul25SGlukCIVJn0cDaoo9ZAu0PKk0BNIG4b-BwkbeliDYewTE2uVvTO_kET3fW4fOr4YHIkpTj\/s16000\/mitre%20attack%20evaluation.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhU17q4Mb_rWmKqoplOVS6CrcdTfGn3yMKsWTpo9pLIuzLUPniEQyOdV_7ANe_dq5O9bitDvGmDCHGz3PQuHrR596Tml6QMGKNc8r8iU8jrOoj4BAQBQ3ul25SGlukCIVJn0cDaoo9ZAu0PKk0BNIG4b-BwkbeliDYewTE2uVvTO_kET3fW4fOr4YHIkpTj\/s16000\/mitre%20attack%20evaluation.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhU17q4Mb_rWmKqoplOVS6CrcdTfGn3yMKsWTpo9pLIuzLUPniEQyOdV_7ANe_dq5O9bitDvGmDCHGz3PQuHrR596Tml6QMGKNc8r8iU8jrOoj4BAQBQ3ul25SGlukCIVJn0cDaoo9ZAu0PKk0BNIG4b-BwkbeliDYewTE2uVvTO_kET3fW4fOr4YHIkpTj\/s16000\/mitre%20attack%20evaluation.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":7091,"url":"https:\/\/kalilinuxtutorials.com\/attackdatamap-datasource-assessment\/","url_meta":{"origin":10479,"position":5},"title":"ATTACKdatamap  : A Datasource Assessment On An Event Level To Show Potential Coverage","author":"R K","date":"October 29, 2019","format":false,"excerpt":"ATTACKdatamap is a datasource assessment on an event level to show potential coverage of the \"MITRE ATT&CK\" framework. This tool is developed by me and has no affiliation with \"MITRE\" nor with its great \"ATT&CK\" team, it is developed with the intention to ease the mapping of data sources to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=10479"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10479\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16279"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=10479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=10479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=10479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}