A modular, menu-driven tool for building time-delayed, distributed security event chains for Red, Blue, and Purple Team exercises.
DumpsterFire is a modular, menu-driven tool for building customized, time-delayed, distributed security events. It allows Red, Blue, and Purple Teams to create chains of simulated incidents (called 'DumpsterFires') for drills, sensor testing, decoy operations, and training exercises. The tool generates realistic network and filesystem artifacts to mimic actual attack narratives.
Security professionals including Red Teams (for creating distractions and lures), Blue Teams (for controlled SOC drills and sensor mapping), and Purple Teams (for repeatable event chains to validate defenses).
It provides a scalable, automated way to run realistic security exercises without manual intervention, with extensible modules, time-delayed execution, and detailed logging for post-operation analysis.
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
You can drop Python scripts into categorized directories under FireModules/, and DumpsterFire auto-detects them at startup, as highlighted in the README's section on extensibility.
Allows configurable time delays between Fire modules to mimic human attack timelines, with the menu guiding you to assign delays for more believable event chains.
The menu-driven dumpsterFireFactory.py script walks users through building, configuring, and igniting scenarios step-by-step, reducing command-line complexity.
Generates auto-generated date-time stamped logs in UTC for global operations and post-engagement analysis, providing accountability and correlation, as described in the Accountability section.
Includes modules like Rickrolling and custom URL openings, adding humor or distractions for wargames, with examples shown in the Shenanigans section of the README.
Built for Python 2.7.x, which is outdated and may pose security risks or compatibility issues; the README's 2020 update mentions a planned migration to Python3 but lacks confirmation of completion.
The README notes only about 30 more Fire modules in development, so the base toolset might be sparse, requiring custom work for specific or advanced attack simulations.
Relies on CLI and menu-driven interfaces without GUI, web dashboards, or APIs, making it less scalable for large teams or integration with modern security orchestration tools.
Small and highly portable detection tests based on MITRE's ATT&CK.
Automated Adversary Emulation Platform
A toolset to make a system look as if it was the victim of an APT attack
A utility to safely generate malicious network traffic patterns and evaluate controls.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.