Skip to content

SpikeTheDragon40k/APT_Simulator_TextAdventure

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

11 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

APT Cyber Killchain Simulator ๐Ÿš€

Red Team Blue Team MIT License Gum Powered
Interactive Red Team & Blue Team training platform simulating real-world APT group operations with terminal-based adventures. Choose your role, select your APT adversary, and execute complete killchains or defensive operations.

๐ŸŽฎ Architecture

TUI Menu (dialog) โ†’ Select Script โ†’ Execute (gum-based) โ†’ Return to Menu

Launcher: Professional ncurses TUI using dialog (standard Linux/macOS) Scripts: Interactive adventures using gum (Charmbracelet)

โœจ Features

Component Technology Description
Launcher dialog (ncurses) Professional TUI menu system
Red Team Scripts gum + bash 14-phase interactive killchains
Blue Team Scripts gum + bash 10-phase defense assessments
MITRE Coverage Manual mapping 32+ ATT&CK techniques
Expandable File-based detection Drop scripts โ†’ Auto-appears

๐Ÿš€ Quick Start

# 1. Install dependencies
sudo apt install dialog        # TUI menu (Linux)
brew install dialog            # TUI menu (macOS)
brew install gum               # Script framework

# 2. Run launcher
chmod +x apt-simulator.sh
./apt-simulator.sh

๐Ÿ“ฑ User Experience

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚            [ MAIN MENU ]                    โ”‚
โ”‚                                             โ”‚
โ”‚   1  ๐Ÿ”ด Red Team                            โ”‚
โ”‚   2  ๐Ÿ›ก๏ธ  Blue Team                          โ”‚
โ”‚   3  โŒ Exit                                โ”‚
โ”‚                                             โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
         โ†“ Select "Red Team"
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚         [ SELECT APT GROUP ]                โ”‚
โ”‚                                             โ”‚
โ”‚   1  ๐Ÿ‡ท๐Ÿ‡บ APT28 (Fancy Bear)                 โ”‚
โ”‚   2  ๐Ÿ‡ท๐Ÿ‡บ APT29 (Cozy Bear)                  โ”‚
โ”‚   3  ๐Ÿ‡ฐ๐Ÿ‡ต Lazarus Group                      โ”‚
โ”‚   ...                                       โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
         โ†“ Select "APT28"
         โ†“ Launches apt28-killchain.sh
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  ๐ŸŽฏ PHASE 1: RECONNAISSANCE (TA0043)       โ”‚
โ”‚  Target Organization? [input box]          โ”‚
โ”‚  โ†’ DNC Servers selected                    โ”‚
โ”‚  โœ… OSINT complete                         โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

๐ŸŽ“ Training Scenarios

โœ… Currently Available

APT Group Red Team Script Blue Team Script Status
APT28 (Fancy Bear) apt28-killchain.sh blueteam-apt28-defense.sh LIVE
APT29 (Cozy Bear) apt29-killchain.sh blueteam-apt29-defense.sh LIVE
Lazarus Group lazarus-killchain.sh blueteam-lazarus-defense.sh LIVE
APT41 (Winnti) apt41-killchain.sh blueteam-apt41-defense.sh LIVE
Lazarus Group lazarus-killchain.sh blueteam-lazarus-defense.sh LIVE

โณ Planned Implementations

APT Group Attribution Notable Operations
APT41 (Winnti) ๐Ÿ‡จ๐Ÿ‡ณ China Double Dragon
Sandworm ๐Ÿ‡ท๐Ÿ‡บ GRU NotPetya, Ukraine Grid
APT32 (Ocean Lotus) ๐Ÿ‡ป๐Ÿ‡ณ Vietnam Southeast Asia
Equation Group ๐Ÿ‡บ๐Ÿ‡ธ NSA FoxAcid Exploits
Turla ๐Ÿ‡ท๐Ÿ‡บ FSB Venomous Bear

๐Ÿ“Š Sample Outputs

TUI Menu Navigation

[dialog ncurses interface - keyboard navigation]
โ†‘/โ†“ arrows to select
Enter to launch
ESC to go back

Red Team Script Execution (APT28)

๐Ÿ‡ท๐Ÿ‡บ APT28 FANCY BEAR SIMULATOR
PHASE 1: RECONNAISSANCE (TA0043)
[gum choose] Select target: US State Department
[gum spin] OSINT collection...
โœ… Emails harvested: 1,247 targets

๐ŸŽ–๏ธ MISSION COMPLETE
Stealth Score: 87/100 โœ… EXCELLENT
Compromised: 12 hosts | Exfiltrated: 2.4GB

Blue Team Script Execution (APT28)

๐Ÿ›ก๏ธ APT28 DEFENSE OPERATIONS
PHASE 1: ASSET INVENTORY
[gum input] Domain Controller: DC01.corp.local
[gum spin] Scanning network...
โœ… Total endpoints: 347

๐Ÿ›ก๏ธ SECURITY GRADE: A - Excellent
Score: 92/100 | Threat Level: LOW
Controls: 28 deployed | Detection Rate: 89%

๐ŸŽฏ MITRE ATT&CK Coverage (APT28)

Tactic Red Team Implementation Blue Team Detection
Reconnaissance TA0043 - OSINT, Active Scanning Sigma Rules, Threat Intel
Initial Access T1566.001 - Spear-phishing Email Sandbox, DMARC
Execution T1059.001 - PowerShell Script Block Logging
Persistence T1547.001 - Registry Run Keys Sysmon EID 13
Privilege Escalation T1068 - Exploit for Privilege Credential Guard
Defense Evasion T1055 - Process Injection Behavioral EDR
Credential Access T1003.001 - LSASS Memory LSA Protection
Lateral Movement T1021.002 - SMB/Windows Shares Network Segmentation
Collection T1114 - Email Collection DLP Controls
Exfiltration T1041 - C2 Channel NetFlow Analysis

๐Ÿ‘ฅ Perfect For

  • Red Team Operators - Realistic TTP execution with stealth scoring
  • Blue Team Analysts - Detection rule validation and IR practice
  • Purple Team Exercises - Collaborative attacker/defender training
  • SOC Training - Incident response workflow development
  • EDR Testing - Platform capability assessment against APT TTPs
  • Certification Prep - OSCP, GCIH, GCFA, CySA+ practical scenarios
  • CTF/Lab Environments - TryHackMe, Hack The Box companion tool

๐Ÿ”ง Technical Details

TUI Launcher (apt-simulator.sh)

  • Framework: dialog (ncurses-based)
  • Navigation: Keyboard-driven menus (โ†‘/โ†“/Enter/ESC)
  • Script Detection: Auto-discovers red-team/*.sh and blue-team/*.sh
  • Exit Handling: Clean return to shell prompt
  • Dependencies: Standard on most Linux/macOS systems

Interactive Scripts (Red/Blue Team)

  • Framework: gum (Charmbracelet terminal toolkit)
  • Components: gum choose, gum input, gum spin, gum style, gum format
  • Output: Logs, reports, session data to /tmp/apt-*
  • Metrics: Stealth scores (Red), Security grades (Blue)

๐Ÿ“ˆ Metrics & Reporting

Red Team Outputs:

  • Stealth Score (0-100)
  • Compromised assets inventory
  • Exfiltration volume (GB)
  • MITRE ATT&CK technique coverage
  • After Action Report (AAR)

Blue Team Outputs:

  • Security Grade (A-F, 0-100)
  • Deployed controls list
  • Detection rule coverage
  • Gap analysis recommendations
  • Assessment report

๐Ÿค Contributing

  1. Add New APTs: Create red-team/aptXX-killchain.sh + matching Blue Team script
  2. Enhance TTPs: Add new MITRE techniques to existing simulators
  3. Detection Rules: Expand Sigma/YARA coverage in Blue Team scripts
  4. Submit PR: Include demo video/screenshots
# Example: Adding APT29
git checkout -b feature/apt29
cp red-team/apt28-killchain.sh red-team/apt29-killchain.sh
# Customize for Cozy Bear TTPs (supply chain, cloud attacks)
git add . && git commit -m "Add APT29 Cozy Bear simulator"
git push && Open PR โœจ

๐Ÿ†• What's New in v1.0

โœจ Professional TUI launcher using ncurses dialog โœจ Auto-discovery of APT scripts - no hardcoding needed
โœจ Clean separation - Menu (TUI) vs Scripts (gum adventures) โœจ Keyboard navigation - Arrow keys, Enter, ESC
โœจ Production ready - Error handling, script validation


Built by cybersecurity practitioners for training the next generation of defenders & operators

โญ Star if useful! ๐Ÿš€ Fork & contribute new APTs! ๐Ÿ›ก๏ธ Train your SOC today!


Quick Commands

# Install everything
sudo apt install dialog && brew install gum

# Launch simulator
./apt-simulator.sh

# Add new APT
cp red-team/apt28-killchain.sh red-team/mynew-apt.sh

# Test script directly
bash red-team/apt28-killchain.sh

Ready for production cybersecurity training environments! ๐ŸŽ“

About

Interactive terminal-based Red Team and Blue Team training simulators

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages