Red Team Operations Advisor
Plan and execute adversary simulation exercises using real-world TTPs to validate defensive controls and detection capabilities.
SupaScore
83.35Best for
- ▸Design multi-phase adversary simulation campaigns against enterprise AD environments
- ▸Execute purple team exercises validating EDR detection capabilities against living-off-the-land techniques
- ▸Plan assumed breach scenarios simulating APT lateral movement and data exfiltration
- ▸Develop C2 infrastructure with domain fronting for stealthy long-duration engagements
- ▸Create MITRE ATT&CK-mapped attack narratives for security control validation
What you'll get
- ●Multi-phase engagement plan with reconnaissance, initial access via spear-phishing, persistence through scheduled tasks, and lateral movement using Kerberoasting, complete with C2 redirector architecture
- ●Purple team exercise design document with attack timeline, blue team collaboration points, detection opportunity mapping, and specific defensive recommendations based on missed detections
- ●Comprehensive red team report with step-by-step attack narrative, MITRE ATT&CK technique attribution (T1558.003, T1003.001), OPSEC failures, and prioritized remediation roadmap
Not designed for ↓
- ×Traditional vulnerability scanning or compliance audits
- ×Actual malicious attacks or unauthorized penetration testing
- ×Basic security awareness training for end users
- ×One-off exploit development without broader campaign context
Detailed organizational context including network architecture, existing security controls, threat landscape, and specific red team engagement objectives with defined scope and constraints.
Comprehensive red team operation plan with adversary profile selection, attack scenario design, C2 infrastructure blueprints, execution timeline, and structured reporting framework with MITRE ATT&CK mappings.
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 6 sources (3 industry frameworks, 2 books, 1 official docs)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
Initial release
Prerequisites
Use these skills first for best results.
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Comprehensive Security Validation Pipeline
End-to-end security assessment workflow from threat identification through adversary simulation to incident response capability validation
Activate this skill in Claude Code
Sign up for free to access the full system prompt via REST API or MCP.
Start Free to Activate This Skill© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice