Adversarial Knowledge Workflow Suite (AKWS) is a comprehensive framework designed to provide both red and blue teams with a structured template for simulating cyber-attacks and defending against them using machine learning techniques. The suite consists of various modules, each targeting a specific aspect of cyber-security, from basic attacks like password spraying to advanced persistent threats like the Golden Ticket attack. The modules are named sequentially from AK1 to AK47, where each module addresses a distinct attack vector or defensive measure.
Objective: Simulate a password spray attack where a few common passwords are tried against many accounts to avoid account lockouts and detect weak credentials.
Features:
- Customizable list of common passwords.
- Configurable rate limits to mimic real-world attack scenarios.
- Logging and reporting of successful attempts.
Objective: Simulate a Golden Ticket attack, where a forged Kerberos ticket grants unauthorized access to resources within the domain.
Features:
- Emulation of ticket creation using compromised domain credentials.
- Simulation of ticket usage to access protected resources.
- Detection algorithms to identify Golden Ticket usage.
- Modular Design: Each attack and defense module is independent, allowing easy integration and customization.
- Machine Learning Integration: Leverages machine learning algorithms to enhance attack simulations and defensive strategies.
- Scalable and Configurable: Designed to work in various environments, with configuration options to tailor the behavior of each module.
- Detailed Reporting: Provides comprehensive reports on each simulated attack, including success rates and detected vulnerabilities.
- Python 3.8 or higher
- Required Python libraries (specified in
requirements.txt
)
-
Clone the repository:
git clone https://github.com/yourusername/akws.git cd akws
-
Install the required libraries:
pip install -r requirements.txt
We welcome contributions from the community. To contribute, please fork the repository and submit a pull request with your changes. Ensure that your code adheres to the existing style and includes appropriate tests.
This project is licensed under the MIT License - see the LICENSE file for details.
HADESS
HADESS performs offensive cybersecurity services through infrastructures and software that include vulnerability analysis, scenario attack planning, and implementation of custom-integrated preventive projects. We organized our activities around the prevention of corporate, industrial, and laboratory cyber threats.