A newer version of the Gradio SDK is available: 6.10.0
metadata
title: Attack Path Visualizer
emoji: πΊοΈ
colorFrom: red
colorTo: purple
sdk: gradio
sdk_version: 5.50.0
python_version: '3.10'
app_file: app.py
pinned: false
license: apache-2.0
tags:
- cybersecurity
- attack-path
- mitre-attack
- visualization
- threat-modeling
- red-team
- pentest
datasets:
- AYI-NEDJIMI/mitre-attack-fr
- AYI-NEDJIMI/mitre-attack-en
πΊοΈ Attack Path Visualizer
A comprehensive interactive visualization tool for cybersecurity attack chains and threat modeling. Perfect for security professionals, red teamers, and defensive teams.
Features
- 10 Common Attack Scenarios - Realistic attack chains covering major threat categories
- MITRE ATT&CK Mapping - All techniques mapped to official MITRE ATT&CK framework
- Interactive Flowcharts - Color-coded attack phases with clickable nodes
- Bilingual Support - English and French interfaces
- Phase Breakdown Analysis - Visual charts showing attack phase distribution
- Detailed Stage Information - Description and MITRE technique details for each step
Attack Paths Included
- Classic AD Domain Compromise - Phishing β Macro β Credential Dump β Lateral Movement β Domain Admin β Data Exfil
- Web App to Internal Network - SQLi β Web Shell β Reverse Shell β Network Recon β Database Access β Exfil
- Cloud Account Takeover - Credential Stuffing β MFA Bypass β API Token Theft β Privilege Escalation β Data Access
- Ransomware Kill Chain - Phishing β Malware β C2 β Reconnaissance β Lateral Movement β Encryption
- Supply Chain Attack - Compromised Dependency β Code Injection β Distribution β C2 β Persistence β Exfil
- Insider Threat - Data Theft - Legitimate Access β Privilege Escalation β Data Discovery β Exfiltration β Cover Tracks
- NTLM Relay Attack - LLMNR Poisoning β NTLM Capture β Relay β Shell Access β Persistence
- Kerberos Attack Chain - SPN Enumeration β Kerberoasting β Pass-the-Hash β DCSync β Hash Extraction
- Web API Exploitation - API Enumeration β Auth Bypass β IDOR β Parameter Tampering β Bulk Export
- Zero-Day Exploitation - Reconnaissance β Zero-Day Discovery β Exploit β C2 β Rootkit β Long-term Theft
Color Legend
- π΄ Red - Initial Access
- π Orange - Execution
- π‘ Yellow - Credential Access
- π΅ Blue - Lateral Movement
- π£ Purple - Privilege Escalation
- π· Teal - Persistence
- π΄ Pink - Command & Control
- β« Black - Exfiltration
- π₯ Dark Red - Impact
Use Cases
- Threat Modeling - Understand realistic attack chains for your environment
- Red Team Training - Train defensive teams on threat scenarios
- Incident Response - Map detected activities to known attack patterns
- Security Awareness - Educate employees on attack progression
- Compliance Documentation - Demonstrate threat understanding for audits
- LinkedIn Sharing - Create awareness-raising content about cybersecurity
Technology
- Gradio - Web interface framework
- Plotly - Interactive visualization and charts
- Python - Backend logic
Installation
pip install -r requirements.txt
python app.py
How to Use
- Select an attack path from the dropdown menu
- Choose your language (English or FranΓ§ais)
- View the interactive attack flowchart
- Read the attack description and statistics
- Review the phase breakdown analysis
- Examine detailed information for each attack stage
MITRE ATT&CK Integration
All attack paths are mapped to official MITRE ATT&CK techniques. Hover over nodes to see:
- Technique name
- MITRE technique ID (e.g., T1566)
- Attack phase classification
Learn more: https://attack.mitre.org/
Educational Purpose
This tool is designed for:
- β Authorized security testing
- β Defensive team training
- β Threat modeling and risk assessment
- β Security awareness and education
- β Incident response planning
This tool should only be used in authorized environments.
Security Notes
- Educational tool for authorized security professionals
- Based on publicly known attack techniques
- Use to improve defensive posture
- Share knowledge responsibly within your organization
Resources
- MITRE ATT&CK Framework
- NIST Cybersecurity Framework
- OWASP Security Top 10
- CIS Critical Security Controls
Contributing
Suggestions for additional attack paths or improvements are welcome!
License
Apache License 2.0
Made with β€οΈ for the cybersecurity community
Perfect for sharing on LinkedIn to raise awareness about cybersecurity threats and defense strategies.
Powered by AYI-NEDJIMI Consultants - AI & Cybersecurity Consulting