Releases: stefony/HADES-Offensive-Simulator
HADES v1.2.0 - Extended Attack Coverage
#HADES - Offensive Simulator v1.2.0
Modular Red Team simulator with TTP timelines, malware emulation, and enhanced log generation
🚀 What’s New:
🔥 Malware Emulation Mode – simulates advanced malware behavior:
Registry persistence (Run key)
File drop in Temp directory
Suspicious Mutex creation
HTTP beacon to remote C2
🛰️ APT TTP Profile Simulation – simulate chained MITRE ATT&CK behaviors
📊 Attack Timeline Visualization – interactive Gantt-style view
📝 Sysmon Event ID 1 Simulation – generate XML logs compatible with detection engines
✅ Enhanced JSON/CSV log export formats
🧬 Every event includes a unique process_guid
📂 Generated Files:
logs/event_log.json – original event details
logs/export.csv – CSV export format
logs/sysmon_log.xml – Sysmon-style event simulation
logs/malware_emulation.json – simulated malware behavior data
logs/generate_event.ps1 – PowerShell-based event generator
⚙️ How to Use:
bash
Copy
Edit
pip install -r requirements.txt
streamlit run hades_gui.py
HADES v1.1.0 – Extended Attack Coverage
🎯 HADES - Offensive Attack Simulator v1.1.0
This update brings new attack simulations, UUID tagging, and improved event exporting.
🆕 New in this release:
- ✅ Added simulations for:
• Command Injection (ping + whoami)
• SQL Injection (Auth Bypass)
• Reflected XSS (script alert)
• Lateral Movement via PsExec - 🧬 Added UUID to each event for uniqueness in logs
- 🗃️ Export logs to CSV with nested Sysmon flattening
- 🧾 PowerShell and Sysmon event simulation improvements
- 💡 Updated README and USAGE instructions
📁 Output files:
logs/event_log.jsonlogs/export.csvlogs/generate_event.ps1logs/sysmon_log.xml
🚀 Run with:
streamlit run hades_gui.py
For educational and simulation purposes only.