Table of Contents
Loading contents...
README.md
Atomic Red Team
Atomic Red Team™ is a library of tests mapped to the
MITRE ATT&CK® framework. Security teams can use
Atomic Red Team to quickly, portably, and reproducibly test their environments.
Get started
You can execute atomic tests directly from the command line, no installation
required. See the Getting started
page of our wiki.
For a more robust testing experience, consider using an execution framework like
Invoke-Atomic.
Learn more
The Atomic Red Team documentation is available as a wiki.
For information about the philosophy and development of Atomic Red Team, visit
our website at https://atomicredteam.io.
To stay up to date on all things Atomic Red Team, sign up for the Atomic Newsletter: https://redcanary.com/atomic-newsletter/
Contribute to Atomic Red Team
Atomic Red Team is open source and community developed. If you’re interested in
becoming a contributor, check out these resources:
- Join our Slack workspace and get involved
with the community. Don’t forget to review the code of conduct
before you join. - Report bugs and request new features by submitting an issue.
- Read our contribution guide
for more information about contributing directly to this repository. - Check the license for information regarding the distribution
and modification of Atomic Red Team. - Contribute to linux atomics quickly from GitHub Codespaces. For more details, click here
Tool Information
Author
redcanaryco
Project Added On
June 01, 2025
License
Open Source
Tags
Related Tools
NTDLLReflection
Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table
Stablekernel-exploit-factory
Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.
StableNovaHypervisor
NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other means) by safeguarding defense products (AntiVirus / Endpoint Protection) and kernel memory structures and preventing unauthorized access to kernel memory.
Stable