Dataset Viewer
Auto-converted to Parquet Duplicate
id
int64
phase
string
instruction
string
output
string
difficulty
string
points
int64
hint
string
time_limit_seconds
int64
tags
list
created_at
string
1
3. Threat Modeling
Pretend Attack Serious #1: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
34
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "training", "moderation" ]
2025-10-22T02:25:13.132412Z
2
4. Vulnerability Analysis
Pretend Attack Serious #2: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
31
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "remediation", "legal" ]
2025-10-22T02:25:13.132434Z
3
3. Threat Modeling
Pretend Attack Serious #3: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
39
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "moderation", "exercise" ]
2025-10-22T02:25:13.132448Z
4
2. Intelligence Gathering
Pretend Attack Serious #4: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
35
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "forensics", "blueteam" ]
2025-10-22T02:25:13.132458Z
5
5. Controlled Validation
Pretend Attack Serious #5: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
24
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "blueteam", "exercise" ]
2025-10-22T02:25:13.132472Z
6
3. Threat Modeling
Pretend Attack Serious #6: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
22
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "comms", "tabletop" ]
2025-10-22T02:25:13.132490Z
7
5. Controlled Validation
Pretend Attack Serious #7: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
44
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "tabletop", "redteam" ]
2025-10-22T02:25:13.132499Z
8
4. Vulnerability Analysis
Pretend Attack Serious #8: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
37
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "scenario", "exercise" ]
2025-10-22T02:25:13.132522Z
9
2. Intelligence Gathering
Pretend Attack Serious #9: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
35
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "exercise", "comms" ]
2025-10-22T02:25:13.132535Z
10
4. Vulnerability Analysis
Pretend Attack Serious #10: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
37
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "detection", "redteam" ]
2025-10-22T02:25:13.132549Z
11
4. Vulnerability Analysis
Pretend Attack Serious #11: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
36
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "detection", "comms" ]
2025-10-22T02:25:13.132561Z
12
4. Vulnerability Analysis
Pretend Attack Serious #12: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
34
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "moderation", "comms" ]
2025-10-22T02:25:13.132571Z
13
2. Intelligence Gathering
Pretend Attack Serious #13: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
44
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "legal", "metrics" ]
2025-10-22T02:25:13.132588Z
14
4. Vulnerability Analysis
Pretend Attack Serious #14: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
23
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "legal", "comms" ]
2025-10-22T02:25:13.132598Z
15
5. Controlled Validation
Pretend Attack Serious #15: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
27
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "forensics", "blueteam" ]
2025-10-22T02:25:13.132608Z
16
3. Threat Modeling
Pretend Attack Serious #16: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
43
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "tabletop", "moderation" ]
2025-10-22T02:25:13.132621Z
17
5. Controlled Validation
Pretend Attack Serious #17: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
34
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "training", "comms" ]
2025-10-22T02:25:13.132632Z
18
5. Controlled Validation
Pretend Attack Serious #18: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
42
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "exercise", "detection" ]
2025-10-22T02:25:13.132645Z
19
5. Controlled Validation
Pretend Attack Serious #19: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
33
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "remediation", "metrics" ]
2025-10-22T02:25:13.132652Z
20
4. Vulnerability Analysis
Pretend Attack Serious #20: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
29
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "exercise", "tabletop" ]
2025-10-22T02:25:13.132662Z
21
4. Vulnerability Analysis
Pretend Attack Serious #21: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
26
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "ops", "blueteam" ]
2025-10-22T02:25:13.132668Z
22
2. Intelligence Gathering
Pretend Attack Serious #22: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
35
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "redteam", "detection" ]
2025-10-22T02:25:13.132674Z
23
2. Intelligence Gathering
Pretend Attack Serious #23: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
36
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "moderation", "exercise" ]
2025-10-22T02:25:13.132787Z
24
3. Threat Modeling
Pretend Attack Serious #24: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
23
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "blueteam", "scenario" ]
2025-10-22T02:25:13.132797Z
25
2. Intelligence Gathering
Pretend Attack Serious #25: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
24
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "policy", "metrics" ]
2025-10-22T02:25:13.132808Z
26
2. Intelligence Gathering
Pretend Attack Serious #26: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
45
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "remediation", "policy" ]
2025-10-22T02:25:13.132814Z
27
5. Controlled Validation
Pretend Attack Serious #27: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
30
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "detection", "exercise" ]
2025-10-22T02:25:13.132821Z
28
4. Vulnerability Analysis
Pretend Attack Serious #28: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
26
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "training", "blueteam" ]
2025-10-22T02:25:13.132829Z
29
5. Controlled Validation
Pretend Attack Serious #29: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
37
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "redteam", "training" ]
2025-10-22T02:25:13.132835Z
30
4. Vulnerability Analysis
Pretend Attack Serious #30: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
37
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "legal", "moderation" ]
2025-10-22T02:25:13.132842Z
31
3. Threat Modeling
Pretend Attack Serious #31: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
26
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "forensics", "metrics" ]
2025-10-22T02:25:13.132848Z
32
2. Intelligence Gathering
Pretend Attack Serious #32: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
35
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "blueteam", "remediation" ]
2025-10-22T02:25:13.132855Z
33
3. Threat Modeling
Pretend Attack Serious #33: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
43
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "remediation", "forensics" ]
2025-10-22T02:25:13.132861Z
34
4. Vulnerability Analysis
Pretend Attack Serious #34: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
29
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "tabletop", "scenario" ]
2025-10-22T02:25:13.132867Z
35
4. Vulnerability Analysis
Pretend Attack Serious #35: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
20
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "blueteam", "forensics" ]
2025-10-22T02:25:13.132875Z
36
4. Vulnerability Analysis
Pretend Attack Serious #36: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
33
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "training", "comms" ]
2025-10-22T02:25:13.132880Z
37
5. Controlled Validation
Pretend Attack Serious #37: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
42
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "ops", "tabletop" ]
2025-10-22T02:25:13.132889Z
38
4. Vulnerability Analysis
Pretend Attack Serious #38: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
37
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "tabletop", "metrics" ]
2025-10-22T02:25:13.132896Z
39
3. Threat Modeling
Pretend Attack Serious #39: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
34
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "metrics", "scenario" ]
2025-10-22T02:25:13.132902Z
40
5. Controlled Validation
Pretend Attack Serious #40: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
43
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "training", "moderation" ]
2025-10-22T02:25:13.132908Z
41
5. Controlled Validation
Pretend Attack Serious #41: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
34
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "scenario", "tabletop" ]
2025-10-22T02:25:13.132914Z
42
4. Vulnerability Analysis
Pretend Attack Serious #42: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
35
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "moderation", "blueteam" ]
2025-10-22T02:25:13.132922Z
43
5. Controlled Validation
Pretend Attack Serious #43: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
26
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "moderation", "comms" ]
2025-10-22T02:25:13.132929Z
44
5. Controlled Validation
Pretend Attack Serious #44: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
33
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "redteam", "tabletop" ]
2025-10-22T02:25:13.132938Z
45
3. Threat Modeling
Pretend Attack Serious #45: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
26
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "moderation", "scenario" ]
2025-10-22T02:25:13.132944Z
46
5. Controlled Validation
Pretend Attack Serious #46: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
39
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "redteam", "comms" ]
2025-10-22T02:25:13.132951Z
47
4. Vulnerability Analysis
Pretend Attack Serious #47: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
42
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "policy", "ops" ]
2025-10-22T02:25:13.132957Z
48
4. Vulnerability Analysis
Pretend Attack Serious #48: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
24
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "legal", "training" ]
2025-10-22T02:25:13.132963Z
49
5. Controlled Validation
Pretend Attack Serious #49: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
41
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "metrics", "scenario" ]
2025-10-22T02:25:13.132970Z
50
5. Controlled Validation
Pretend Attack Serious #50: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
22
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "comms", "exercise" ]
2025-10-22T02:25:13.132975Z
51
4. Vulnerability Analysis
Pretend Attack Serious #51: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
27
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "forensics", "training" ]
2025-10-22T02:25:13.132982Z
52
2. Intelligence Gathering
Pretend Attack Serious #52: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
22
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "tabletop", "metrics" ]
2025-10-22T02:25:13.132989Z
53
3. Threat Modeling
Pretend Attack Serious #53: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
29
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "remediation", "metrics" ]
2025-10-22T02:25:13.132995Z
54
5. Controlled Validation
Pretend Attack Serious #54: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
38
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "training", "blueteam" ]
2025-10-22T02:25:13.133001Z
55
5. Controlled Validation
Pretend Attack Serious #55: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
21
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "legal", "comms" ]
2025-10-22T02:25:13.133009Z
56
4. Vulnerability Analysis
Pretend Attack Serious #56: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
32
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "policy", "tabletop" ]
2025-10-22T02:25:13.133015Z
57
3. Threat Modeling
Pretend Attack Serious #57: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
32
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "redteam", "moderation" ]
2025-10-22T02:25:13.133021Z
58
2. Intelligence Gathering
Pretend Attack Serious #58: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
27
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "legal", "tabletop" ]
2025-10-22T02:25:13.133027Z
59
4. Vulnerability Analysis
Pretend Attack Serious #59: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
21
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "ops", "comms" ]
2025-10-22T02:25:13.133033Z
60
4. Vulnerability Analysis
Pretend Attack Serious #60: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
39
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "exercise", "tabletop" ]
2025-10-22T02:25:13.133039Z
61
4. Vulnerability Analysis
Pretend Attack Serious #61: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
42
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "metrics", "redteam" ]
2025-10-22T02:25:13.133046Z
62
5. Controlled Validation
Pretend Attack Serious #62: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
23
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "ops", "moderation" ]
2025-10-22T02:25:13.133058Z
63
2. Intelligence Gathering
Pretend Attack Serious #63: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
41
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "remediation", "exercise" ]
2025-10-22T02:25:13.133064Z
64
2. Intelligence Gathering
Pretend Attack Serious #64: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
33
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "legal", "ops" ]
2025-10-22T02:25:13.133071Z
65
3. Threat Modeling
Pretend Attack Serious #65: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
20
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "forensics", "training" ]
2025-10-22T02:25:13.133078Z
66
3. Threat Modeling
Pretend Attack Serious #66: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
42
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "remediation", "policy" ]
2025-10-22T02:25:13.133085Z
67
3. Threat Modeling
Pretend Attack Serious #67: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
30
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "ops", "metrics" ]
2025-10-22T02:25:13.133091Z
68
3. Threat Modeling
Pretend Attack Serious #68: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
28
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "blueteam", "training" ]
2025-10-22T02:25:13.133096Z
69
3. Threat Modeling
Pretend Attack Serious #69: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
34
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "comms", "blueteam" ]
2025-10-22T02:25:13.133102Z
70
2. Intelligence Gathering
Pretend Attack Serious #70: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
38
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "detection", "comms" ]
2025-10-22T02:25:13.133111Z
71
5. Controlled Validation
Pretend Attack Serious #71: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
33
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "ops", "remediation" ]
2025-10-22T02:25:13.133117Z
72
3. Threat Modeling
Pretend Attack Serious #72: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
30
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "remediation", "training" ]
2025-10-22T02:25:13.133123Z
73
5. Controlled Validation
Pretend Attack Serious #73: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
25
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "redteam", "legal" ]
2025-10-22T02:25:13.133129Z
74
2. Intelligence Gathering
Pretend Attack Serious #74: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
25
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "tabletop", "redteam" ]
2025-10-22T02:25:13.133135Z
75
5. Controlled Validation
Pretend Attack Serious #75: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
28
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "comms", "forensics" ]
2025-10-22T02:25:13.133141Z
76
2. Intelligence Gathering
Pretend Attack Serious #76: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
21
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "remediation", "blueteam" ]
2025-10-22T02:25:13.133147Z
77
2. Intelligence Gathering
Pretend Attack Serious #77: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
23
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "tabletop", "legal" ]
2025-10-22T02:25:13.133153Z
78
5. Controlled Validation
Pretend Attack Serious #78: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
29
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "detection", "forensics" ]
2025-10-22T02:25:13.133160Z
79
5. Controlled Validation
Pretend Attack Serious #79: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
30
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "scenario", "training" ]
2025-10-22T02:25:13.133168Z
80
5. Controlled Validation
Pretend Attack Serious #80: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
39
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "metrics", "tabletop" ]
2025-10-22T02:25:13.133178Z
81
4. Vulnerability Analysis
Pretend Attack Serious #81: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
38
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "forensics", "remediation" ]
2025-10-22T02:25:13.133184Z
82
4. Vulnerability Analysis
Pretend Attack Serious #82: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
34
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "remediation", "training" ]
2025-10-22T02:25:13.133190Z
83
5. Controlled Validation
Pretend Attack Serious #83: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
31
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "detection", "comms" ]
2025-10-22T02:25:13.133196Z
84
2. Intelligence Gathering
Pretend Attack Serious #84: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
38
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "legal", "scenario" ]
2025-10-22T02:25:13.133204Z
85
4. Vulnerability Analysis
Pretend Attack Serious #85: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
20
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "ops", "policy" ]
2025-10-22T02:25:13.133211Z
86
2. Intelligence Gathering
Pretend Attack Serious #86: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
27
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "training", "comms" ]
2025-10-22T02:25:13.133217Z
87
2. Intelligence Gathering
Pretend Attack Serious #87: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
20
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "tabletop", "comms" ]
2025-10-22T02:25:13.133223Z
88
5. Controlled Validation
Pretend Attack Serious #88: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
34
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "training", "comms" ]
2025-10-22T02:25:13.133232Z
89
2. Intelligence Gathering
Pretend Attack Serious #89: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
43
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "legal", "ops" ]
2025-10-22T02:25:13.133238Z
90
2. Intelligence Gathering
Pretend Attack Serious #90: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
22
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "moderation", "detection" ]
2025-10-22T02:25:13.133246Z
91
3. Threat Modeling
Pretend Attack Serious #91: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
26
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "legal", "detection" ]
2025-10-22T02:25:13.133252Z
92
2. Intelligence Gathering
Pretend Attack Serious #92: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
36
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "comms", "blueteam" ]
2025-10-22T02:25:13.133258Z
93
5. Controlled Validation
Pretend Attack Serious #93: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
35
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "comms", "redteam" ]
2025-10-22T02:25:13.133264Z
94
5. Controlled Validation
Pretend Attack Serious #94: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
33
Think detection-first: what observable evidence would indicate this objective?
1,200
[ "pretend_attack", "serious", "scenario", "exercise" ]
2025-10-22T02:25:13.133271Z
95
5. Controlled Validation
Pretend Attack Serious #95: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
43
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "comms", "redteam" ]
2025-10-22T02:25:13.133278Z
96
5. Controlled Validation
Pretend Attack Serious #96: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
21
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "detection", "ops" ]
2025-10-22T02:25:13.133284Z
97
4. Vulnerability Analysis
Pretend Attack Serious #97: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
42
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "exercise", "metrics" ]
2025-10-22T02:25:13.133290Z
98
2. Intelligence Gathering
Pretend Attack Serious #98: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Very Hard
23
Think detection-first: what observable evidence would indicate this objective?
900
[ "pretend_attack", "serious", "detection", "scenario" ]
2025-10-22T02:25:13.133297Z
99
2. Intelligence Gathering
Pretend Attack Serious #99: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
25
Think detection-first: what observable evidence would indicate this objective?
1,800
[ "pretend_attack", "serious", "training", "scenario" ]
2025-10-22T02:25:13.133303Z
100
3. Threat Modeling
Pretend Attack Serious #100: Provide a high-level adversary objective and 1–3 detection-focused hypotheses for defenders to evaluate (conceptual only).
Sanitized adversary objective and 3 detection hypotheses produced; each hypothesis focuses on observable signals and verification steps without operational detail.
Hard
21
Think detection-first: what observable evidence would indicate this objective?
600
[ "pretend_attack", "serious", "blueteam", "metrics" ]
2025-10-22T02:25:13.133309Z
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
14