Skip to content

Releases: stefony/HADES-Offensive-Simulator

HADES v1.2.0 - Extended Attack Coverage

25 Jul 06:52

Choose a tag to compare

#HADES - Offensive Simulator v1.2.0
Modular Red Team simulator with TTP timelines, malware emulation, and enhanced log generation

🚀 What’s New:
🔥 Malware Emulation Mode – simulates advanced malware behavior:

Registry persistence (Run key)

File drop in Temp directory

Suspicious Mutex creation

HTTP beacon to remote C2

🛰️ APT TTP Profile Simulation – simulate chained MITRE ATT&CK behaviors

📊 Attack Timeline Visualization – interactive Gantt-style view

📝 Sysmon Event ID 1 Simulation – generate XML logs compatible with detection engines

✅ Enhanced JSON/CSV log export formats

🧬 Every event includes a unique process_guid

📂 Generated Files:
logs/event_log.json – original event details

logs/export.csv – CSV export format

logs/sysmon_log.xml – Sysmon-style event simulation

logs/malware_emulation.json – simulated malware behavior data

logs/generate_event.ps1 – PowerShell-based event generator

⚙️ How to Use:
bash
Copy
Edit
pip install -r requirements.txt
streamlit run hades_gui.py

HADES v1.1.0 – Extended Attack Coverage

23 Jul 21:31

Choose a tag to compare

🎯 HADES - Offensive Attack Simulator v1.1.0

This update brings new attack simulations, UUID tagging, and improved event exporting.

🆕 New in this release:

  • ✅ Added simulations for:
    • Command Injection (ping + whoami)
    • SQL Injection (Auth Bypass)
    • Reflected XSS (script alert)
    • Lateral Movement via PsExec
  • 🧬 Added UUID to each event for uniqueness in logs
  • 🗃️ Export logs to CSV with nested Sysmon flattening
  • 🧾 PowerShell and Sysmon event simulation improvements
  • 💡 Updated README and USAGE instructions

📁 Output files:

  • logs/event_log.json
  • logs/export.csv
  • logs/generate_event.ps1
  • logs/sysmon_log.xml

🚀 Run with:

streamlit run hades_gui.py

For educational and simulation purposes only.