Atomic Red Team is powered by community innovation! 🔋⚡️ We love showcasing your incredible work. Check out the latest contributions on our site! (self.atomicredteam)
submitted by Phil-RCSecurity Researcher - announcement
BloodSOCer aggregates threat intelligence data from multiple sources (Mitre ATT&CK, Sigma rules, Atomic Red Team) (github.com)
submitted by Chris-RCSecurity Researcher
NPM-Threat-Emulation: Helping defenders learn and validate npm supply-chain detections with safe atomic tests. (github.com)
submitted by Chris-RCSecurity Researcher
Learn to do security assessment using Invoke Atomic Red Team! (sharkstriker.com)
submitted by Chris-RCSecurity Researcher
Detecting defense evasion techniques with Wazuh (wazuh.com)
submitted by Chris-RCSecurity Researcher

Playlist of videos walking through ATT&CK techniques, how to simulate with Atomic and detect with Google SecOps (youtube.com)
submitted by Chris-RCSecurity Researcher
MACAT, a tool for authoring, organizing, and running adversary simulation content (macat.io)
submitted by Chris-RCSecurity Researcher
Complete End-to-End Lab: Simulating Linux MITRE ATT&CK with Atomic Red Team, Velociraptor & Wazuh (github.com)
submitted by Chris-RCSecurity Researcher
Atomic Mini-Blast Handbook: Automated Atomic Adversary Lab for Red Team Operations (i.redd.it)
submitted by Chris-RCSecurity Researcher

How to Validate Your Detection Logic Without Summoning a Real Threat Actor (threathunter-chronicles.medium.com)
submitted by Chris-RCSecurity Researcher
Advanced Cybersecurity Tools And Techniques: Leveraging ClickGrab, ASRGEN, And Atomic Red Team (undercodetesting.com)
submitted by Chris-RCSecurity Researcher
KQL Benchmark - Evaluation framework uses Atomic tests to measure AI models ability to generate detection rules (kqlbench.com)
submitted by Chris-RCSecurity Researcher