Levaraging the power of the ATT&CK Database to enrich an AI agent to deployed as a browser thread for Adversary Emulation from a container
-
Initial Plan Create an agent.py file that does the following:
-
receive the ATT&CK TTP prompt from the user
-
searches its resources for the right URL
- uses Vector DB workers to send requests to the ATTCK Database
- Identifies the correct ATTCK content to execute the request
-
Offers the most aligned URL with the users’ prompt request
-
Requests the raw byte-string data from the URL webpage
-
AES256 decrypts the byte-string data
-
Executes the content of the decrypted byte-string data as a new thread
-
Contributions, suggestions, and feedback are welcome. Please create an issue or pull request for any contributions.
- Fork the repository.
- Create a new branch for your
username-dev
(e.g.cmndcntrlcyber-dev
) feature (e.g.cmndcntrlcyber-feat
) or bug fix (e.g.cmndcntrlcyber-fix
). - Make your changes and commit them.
- Push your changes to your forked repository.
- Open a pull request in the main repository.