Interactive Red Team & Blue Team training platform simulating real-world APT group operations with terminal-based adventures. Choose your role, select your APT adversary, and execute complete killchains or defensive operations.
TUI Menu (dialog) โ Select Script โ Execute (gum-based) โ Return to Menu
Launcher: Professional ncurses TUI using dialog (standard Linux/macOS)
Scripts: Interactive adventures using gum (Charmbracelet)
| Component | Technology | Description |
|---|---|---|
| Launcher | dialog (ncurses) |
Professional TUI menu system |
| Red Team Scripts | gum + bash |
14-phase interactive killchains |
| Blue Team Scripts | gum + bash |
10-phase defense assessments |
| MITRE Coverage | Manual mapping | 32+ ATT&CK techniques |
| Expandable | File-based detection | Drop scripts โ Auto-appears |
# 1. Install dependencies
sudo apt install dialog # TUI menu (Linux)
brew install dialog # TUI menu (macOS)
brew install gum # Script framework
# 2. Run launcher
chmod +x apt-simulator.sh
./apt-simulator.shโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ [ MAIN MENU ] โ
โ โ
โ 1 ๐ด Red Team โ
โ 2 ๐ก๏ธ Blue Team โ
โ 3 โ Exit โ
โ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Select "Red Team"
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ [ SELECT APT GROUP ] โ
โ โ
โ 1 ๐ท๐บ APT28 (Fancy Bear) โ
โ 2 ๐ท๐บ APT29 (Cozy Bear) โ
โ 3 ๐ฐ๐ต Lazarus Group โ
โ ... โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Select "APT28"
โ Launches apt28-killchain.sh
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ ๐ฏ PHASE 1: RECONNAISSANCE (TA0043) โ
โ Target Organization? [input box] โ
โ โ DNC Servers selected โ
โ โ
OSINT complete โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
| APT Group | Red Team Script | Blue Team Script | Status |
|---|---|---|---|
| APT28 (Fancy Bear) | apt28-killchain.sh |
blueteam-apt28-defense.sh |
LIVE |
| APT29 (Cozy Bear) | apt29-killchain.sh |
blueteam-apt29-defense.sh |
LIVE |
| Lazarus Group | lazarus-killchain.sh |
blueteam-lazarus-defense.sh |
LIVE |
| APT41 (Winnti) | apt41-killchain.sh |
blueteam-apt41-defense.sh |
LIVE |
| Lazarus Group | lazarus-killchain.sh |
blueteam-lazarus-defense.sh |
LIVE |
| APT Group | Attribution | Notable Operations |
|---|---|---|
| APT41 (Winnti) | ๐จ๐ณ China | Double Dragon |
| Sandworm | ๐ท๐บ GRU | NotPetya, Ukraine Grid |
| APT32 (Ocean Lotus) | ๐ป๐ณ Vietnam | Southeast Asia |
| Equation Group | ๐บ๐ธ NSA | FoxAcid Exploits |
| Turla | ๐ท๐บ FSB | Venomous Bear |
[dialog ncurses interface - keyboard navigation]
โ/โ arrows to select
Enter to launch
ESC to go back
๐ท๐บ APT28 FANCY BEAR SIMULATOR
PHASE 1: RECONNAISSANCE (TA0043)
[gum choose] Select target: US State Department
[gum spin] OSINT collection...
โ
Emails harvested: 1,247 targets
๐๏ธ MISSION COMPLETE
Stealth Score: 87/100 โ
EXCELLENT
Compromised: 12 hosts | Exfiltrated: 2.4GB
๐ก๏ธ APT28 DEFENSE OPERATIONS
PHASE 1: ASSET INVENTORY
[gum input] Domain Controller: DC01.corp.local
[gum spin] Scanning network...
โ
Total endpoints: 347
๐ก๏ธ SECURITY GRADE: A - Excellent
Score: 92/100 | Threat Level: LOW
Controls: 28 deployed | Detection Rate: 89%
| Tactic | Red Team Implementation | Blue Team Detection |
|---|---|---|
| Reconnaissance | TA0043 - OSINT, Active Scanning | Sigma Rules, Threat Intel |
| Initial Access | T1566.001 - Spear-phishing | Email Sandbox, DMARC |
| Execution | T1059.001 - PowerShell | Script Block Logging |
| Persistence | T1547.001 - Registry Run Keys | Sysmon EID 13 |
| Privilege Escalation | T1068 - Exploit for Privilege | Credential Guard |
| Defense Evasion | T1055 - Process Injection | Behavioral EDR |
| Credential Access | T1003.001 - LSASS Memory | LSA Protection |
| Lateral Movement | T1021.002 - SMB/Windows Shares | Network Segmentation |
| Collection | T1114 - Email Collection | DLP Controls |
| Exfiltration | T1041 - C2 Channel | NetFlow Analysis |
- Red Team Operators - Realistic TTP execution with stealth scoring
- Blue Team Analysts - Detection rule validation and IR practice
- Purple Team Exercises - Collaborative attacker/defender training
- SOC Training - Incident response workflow development
- EDR Testing - Platform capability assessment against APT TTPs
- Certification Prep - OSCP, GCIH, GCFA, CySA+ practical scenarios
- CTF/Lab Environments - TryHackMe, Hack The Box companion tool
- Framework:
dialog(ncurses-based) - Navigation: Keyboard-driven menus (โ/โ/Enter/ESC)
- Script Detection: Auto-discovers
red-team/*.shandblue-team/*.sh - Exit Handling: Clean return to shell prompt
- Dependencies: Standard on most Linux/macOS systems
- Framework:
gum(Charmbracelet terminal toolkit) - Components:
gum choose,gum input,gum spin,gum style,gum format - Output: Logs, reports, session data to
/tmp/apt-* - Metrics: Stealth scores (Red), Security grades (Blue)
Red Team Outputs:
- Stealth Score (0-100)
- Compromised assets inventory
- Exfiltration volume (GB)
- MITRE ATT&CK technique coverage
- After Action Report (AAR)
Blue Team Outputs:
- Security Grade (A-F, 0-100)
- Deployed controls list
- Detection rule coverage
- Gap analysis recommendations
- Assessment report
- Add New APTs: Create
red-team/aptXX-killchain.sh+ matching Blue Team script - Enhance TTPs: Add new MITRE techniques to existing simulators
- Detection Rules: Expand Sigma/YARA coverage in Blue Team scripts
- Submit PR: Include demo video/screenshots
# Example: Adding APT29
git checkout -b feature/apt29
cp red-team/apt28-killchain.sh red-team/apt29-killchain.sh
# Customize for Cozy Bear TTPs (supply chain, cloud attacks)
git add . && git commit -m "Add APT29 Cozy Bear simulator"
git push && Open PR โจโจ Professional TUI launcher using ncurses dialog
โจ Auto-discovery of APT scripts - no hardcoding needed
โจ Clean separation - Menu (TUI) vs Scripts (gum adventures)
โจ Keyboard navigation - Arrow keys, Enter, ESC
โจ Production ready - Error handling, script validation
Built by cybersecurity practitioners for training the next generation of defenders & operators
โญ Star if useful! ๐ Fork & contribute new APTs! ๐ก๏ธ Train your SOC today!
# Install everything
sudo apt install dialog && brew install gum
# Launch simulator
./apt-simulator.sh
# Add new APT
cp red-team/apt28-killchain.sh red-team/mynew-apt.sh
# Test script directly
bash red-team/apt28-killchain.shReady for production cybersecurity training environments! ๐