OP-001 · Adversary Emulation Program
In Progress · APT29 Phase 1
APT Emulation Program
A research project reconstructing nation-state TTPs into functional tooling — built from primary-source threat intelligence reports, not ATT&CK generics. Each emulation takes a named campaign, extracts the actual behavioral patterns documented by Mandiant, MSTIC, CrowdStrike, and FireEye, then re-implements them as working tools engineered to evade 2026 enterprise defenses.
APT29/NOBELIUM is the first active emulation. Custom tooling written in C, Python, and PowerShell — EnvyScout HTML smuggler, evasive loader (Hell's Gate indirect syscalls, Ekko sleep masking, call stack spoofing), and a POSHSPY WMI backdoor. Tested against Elastic EDR 9.3 in full block/prevent mode and Windows Defender.
APT Roster
APT29
Cozy Bear / NOBELIUM
● In Progress
APT28
Fancy Bear / SOFACY
○ Queued
Turla
Venomous Bear
○ Queued
Sandworm
Voodoo Bear
○ Queued
Berserk Bear
Dragonfly / Energetic Bear
○ Queued
01Init Access
02C2 Setup
03Discovery
04UAC Bypass
05Priv Esc
06Cred Access
07Def Evasion
08Persistence
09Lat Move
10Dom Priv Esc
11Dom Persist
12Cleanup
Also building →
CLASSIFIED
C2 framework with runtime TTP switching — behavioral profiles for each Bear. Hover to un-redact.
C / Win32Indirect SyscallsEkko Sleep Mask
Stack SpoofingHTML SmugglingWMI Backdoor
PythonPowerShellThreat Intel
EDR Detections00
APTs Queued06
Tools Authored07+
OP-002 · Browser-resident defense
Shipping · 75+ installs
ClickArmor
A browser extension built to catch what traditional endpoint tools miss — ClickFix lures, clipboard hijacking chains, credential phishing, and social engineering pretexts at the moment of contact.
- Analyzed 55,000+ phishing samples from PhishTank and ThreatFox to extract indicators and validate detection coverage against live adversary infrastructure.
- Reverse-engineered 5,000+ ClickFix domains to map execution chains, staging infrastructure, and obfuscation patterns.
- Enterprise offering (Armor Console) includes Splunk SIEM integration with structured
ditm:armor:agent events and agent enrollment.
ExtensionClickFixClipboard HijackSplunk SIEMArmor Console
Installs75+
TelemetrySplunk
Samples55k+
OP-003 · Offensive Infra Lab
Operational
Phishing Infrastructure Lab
End-to-end AiTM phishing range built to study adversary delivery infrastructure, MFA bypass techniques, and anti-analysis evasion.
- Deployed Evilginx with custom phishlets for MFA bypass and session hijacking; automated provisioning with Terraform and Caddy reverse proxies.
- Implemented JA4 fingerprinting, headless browser detection, website keying, and dynamic obfuscation to study anti-analysis evasion patterns.
- Tested HTML smuggling via SVG payloads against Google Safe Browsing to understand delivery evasion at scale.
AiTMEvilginxMFA BypassJA4HTML SmugglingTerraform