Spaces:
Sleeping
Sleeping
| title: Attack Path Visualizer | |
| emoji: πΊοΈ | |
| colorFrom: red | |
| colorTo: purple | |
| sdk: gradio | |
| sdk_version: 5.50.0 | |
| python_version: '3.10' | |
| app_file: app.py | |
| pinned: false | |
| license: apache-2.0 | |
| tags: | |
| - cybersecurity | |
| - attack-path | |
| - mitre-attack | |
| - visualization | |
| - threat-modeling | |
| - red-team | |
| - pentest | |
| datasets: | |
| - AYI-NEDJIMI/mitre-attack-fr | |
| - AYI-NEDJIMI/mitre-attack-en | |
| # πΊοΈ Attack Path Visualizer | |
| A comprehensive interactive visualization tool for cybersecurity attack chains and threat modeling. Perfect for security professionals, red teamers, and defensive teams. | |
| ## Features | |
| - **10 Common Attack Scenarios** - Realistic attack chains covering major threat categories | |
| - **MITRE ATT&CK Mapping** - All techniques mapped to official MITRE ATT&CK framework | |
| - **Interactive Flowcharts** - Color-coded attack phases with clickable nodes | |
| - **Bilingual Support** - English and French interfaces | |
| - **Phase Breakdown Analysis** - Visual charts showing attack phase distribution | |
| - **Detailed Stage Information** - Description and MITRE technique details for each step | |
| ## Attack Paths Included | |
| 1. **Classic AD Domain Compromise** - Phishing β Macro β Credential Dump β Lateral Movement β Domain Admin β Data Exfil | |
| 2. **Web App to Internal Network** - SQLi β Web Shell β Reverse Shell β Network Recon β Database Access β Exfil | |
| 3. **Cloud Account Takeover** - Credential Stuffing β MFA Bypass β API Token Theft β Privilege Escalation β Data Access | |
| 4. **Ransomware Kill Chain** - Phishing β Malware β C2 β Reconnaissance β Lateral Movement β Encryption | |
| 5. **Supply Chain Attack** - Compromised Dependency β Code Injection β Distribution β C2 β Persistence β Exfil | |
| 6. **Insider Threat - Data Theft** - Legitimate Access β Privilege Escalation β Data Discovery β Exfiltration β Cover Tracks | |
| 7. **NTLM Relay Attack** - LLMNR Poisoning β NTLM Capture β Relay β Shell Access β Persistence | |
| 8. **Kerberos Attack Chain** - SPN Enumeration β Kerberoasting β Pass-the-Hash β DCSync β Hash Extraction | |
| 9. **Web API Exploitation** - API Enumeration β Auth Bypass β IDOR β Parameter Tampering β Bulk Export | |
| 10. **Zero-Day Exploitation** - Reconnaissance β Zero-Day Discovery β Exploit β C2 β Rootkit β Long-term Theft | |
| ## Color Legend | |
| - π΄ **Red** - Initial Access | |
| - π **Orange** - Execution | |
| - π‘ **Yellow** - Credential Access | |
| - π΅ **Blue** - Lateral Movement | |
| - π£ **Purple** - Privilege Escalation | |
| - π· **Teal** - Persistence | |
| - π΄ **Pink** - Command & Control | |
| - β« **Black** - Exfiltration | |
| - π₯ **Dark Red** - Impact | |
| ## Use Cases | |
| - **Threat Modeling** - Understand realistic attack chains for your environment | |
| - **Red Team Training** - Train defensive teams on threat scenarios | |
| - **Incident Response** - Map detected activities to known attack patterns | |
| - **Security Awareness** - Educate employees on attack progression | |
| - **Compliance Documentation** - Demonstrate threat understanding for audits | |
| - **LinkedIn Sharing** - Create awareness-raising content about cybersecurity | |
| ## Technology | |
| - **Gradio** - Web interface framework | |
| - **Plotly** - Interactive visualization and charts | |
| - **Python** - Backend logic | |
| ## Installation | |
| ```bash | |
| pip install -r requirements.txt | |
| python app.py | |
| ``` | |
| ## How to Use | |
| 1. Select an attack path from the dropdown menu | |
| 2. Choose your language (English or FranΓ§ais) | |
| 3. View the interactive attack flowchart | |
| 4. Read the attack description and statistics | |
| 5. Review the phase breakdown analysis | |
| 6. Examine detailed information for each attack stage | |
| ## MITRE ATT&CK Integration | |
| All attack paths are mapped to official MITRE ATT&CK techniques. Hover over nodes to see: | |
| - Technique name | |
| - MITRE technique ID (e.g., T1566) | |
| - Attack phase classification | |
| Learn more: https://attack.mitre.org/ | |
| ## Educational Purpose | |
| This tool is designed for: | |
| - β Authorized security testing | |
| - β Defensive team training | |
| - β Threat modeling and risk assessment | |
| - β Security awareness and education | |
| - β Incident response planning | |
| This tool should only be used in authorized environments. | |
| ## Security Notes | |
| - Educational tool for authorized security professionals | |
| - Based on publicly known attack techniques | |
| - Use to improve defensive posture | |
| - Share knowledge responsibly within your organization | |
| ## Resources | |
| - [MITRE ATT&CK Framework](https://attack.mitre.org/) | |
| - [NIST Cybersecurity Framework](https://www.nist.gov/cyberframework) | |
| - [OWASP Security Top 10](https://owasp.org/www-project-top-ten/) | |
| - [CIS Critical Security Controls](https://www.cisecurity.org/controls/) | |
| ## Contributing | |
| Suggestions for additional attack paths or improvements are welcome! | |
| ## License | |
| Apache License 2.0 | |
| --- | |
| **Made with β€οΈ for the cybersecurity community** | |
| Perfect for sharing on LinkedIn to raise awareness about cybersecurity threats and defense strategies. | |
| --- | |
| **Powered by [AYI-NEDJIMI Consultants](https://ayinedjimi-consultants.fr)** - AI & Cybersecurity Consulting | |
| - [All Datasets](https://huggingface.co/AYI-NEDJIMI) | |
| - [AI & Cyberdefense Whitepaper](https://ayinedjimi-consultants.fr/livre-blanc-ia-cyberdefense.html) | |