HADES (Highly Automated Detection Evasion Simulator) is a Red Team simulation tool built to generate offensive attack logs for training, SOC pipelines, and adversary emulation.
-
✅ Modern Streamlit Web UI
-
🧰 Simulates offensive techniques and malware behavior
-
🧬 MITRE ATT&CK techniques mapped
-
🧪 Malware Emulation Mode (T1055.001, Registry, C2, Mutex, etc.)
-
🛰️ APT TTP Simulation with profiles (e.g., APT29)
-
- 🎣 Phishing Simulation (Credential Harvesting)
-
💣 Insecure Deserialization simulation
-
🗃️ Exports logs in:
JSON
(event_log.json
)CSV
(export.csv
)Sysmon XML
(sysmon_log.xml
)PowerShell
log scripts (generate_event.ps1
)
-
📥 Accepts uploaded custom
.json
logs for conversion -
📊 Timeline chart generation with Plotly
-
🧠 Educational use for SOC analysts, blue teams, and students
Technique | MITRE ID |
---|---|
Credential Dump | T1003.001 |
Reverse Shell (PS obf) | T1059.001 |
Command Injection | T1059 |
SQL Injection | T1505.001 |
Reflected XSS | T1059.007 |
Lateral Movement (PsExec) | T1021.002 |
Phishing (Credential Harvesting) | T1566.001 |
Insecure Deserialization | T1539 |
Simulates behaviors including:
- Registry persistence
- Temp file drop
- Mutex creation
- C2 beaconing (HTTP)
- Process injection (
T1055.001
)
Select from built-in profiles (e.g., APT29 - Cozy Bear).
Steps are replayed using realistic offensive TTPs and logs are auto-generated.
All logs are saved to the logs/
folder:
event_log.json
export.csv
sysmon_log.xml
generate_event.ps1
malware_emulation.json
– includes malware and phishing simulation logs
git clone https://github.com/stefony/HADES-Offensive-Simulator.git
cd HADES-Offensive-Simulator
pip install -r requirements.txt
streamlit run hades_gui.py
## ⚠️ Known Issues
If you get the following error:
`ModuleNotFoundError: No module named 'plotly'`
Make sure `plotly` is installed:
```bash
pip install plotly```
Alternatively, ensure plotly is listed in `requirements.txt` and reinstall dependencies:
```bash
pip install -r requirements.txt```