Atomic Red Team


Atomic Red Team allows every security team to test their controls by executing simple “atomic tests” that exercise the same techniques used by adversaries (all mapped to Mitre’s ATT&CK).


The purpose of Atomic Red Team in DetectionLab is to allow the user to simulate TTPs and observe the resulting telemetry or create new detections.

Configuration Details

  • Installed from install-redteam.ps1
  • The Invoke-AtomicRedTeam execution framework

Sample Usage

Import Powershell module and atomics-path:

Import-Module "C:\Tools\AtomicRedTeam\invoke-atomicredteam\Invoke-AtomicRedTeam.psd1" -Force
$PSDefaultParameterValues = @{"Invoke-AtomicTest:PathToAtomicsFolder"="C:\Tools\AtomicRedTeam\atomics"}

Run E.g. technique T1218.010 (Signed Binary Proxy Execution: Regsvr32):

Invoke-AtomicTest T1218.010 -TestNumbers 1,2

Run all techniques:

Invoke-AtomicTest All

More here:

Data Location

This tools and test are located in C:\Tools\AtomicRedTeam\

This tool/application does not generate logs