← Back to Skills

Red Team Operations Advisor

Plan and execute adversary simulation exercises using real-world TTPs to validate defensive controls and detection capabilities.

Gold
v1.0.00 activationsSecurityEngineeringexpert

SupaScore

83.35
Research Quality (15%)
9
Prompt Engineering (25%)
8.5
Practical Utility (15%)
7.8
Completeness (10%)
8.3
User Satisfaction (20%)
8
Decision Usefulness (15%)
8.4

Best for

  • Design multi-phase adversary simulation campaigns against enterprise AD environments
  • Execute purple team exercises validating EDR detection capabilities against living-off-the-land techniques
  • Plan assumed breach scenarios simulating APT lateral movement and data exfiltration
  • Develop C2 infrastructure with domain fronting for stealthy long-duration engagements
  • Create MITRE ATT&CK-mapped attack narratives for security control validation

What you'll get

  • Multi-phase engagement plan with reconnaissance, initial access via spear-phishing, persistence through scheduled tasks, and lateral movement using Kerberoasting, complete with C2 redirector architecture
  • Purple team exercise design document with attack timeline, blue team collaboration points, detection opportunity mapping, and specific defensive recommendations based on missed detections
  • Comprehensive red team report with step-by-step attack narrative, MITRE ATT&CK technique attribution (T1558.003, T1003.001), OPSEC failures, and prioritized remediation roadmap
Not designed for ↓
  • ×Traditional vulnerability scanning or compliance audits
  • ×Actual malicious attacks or unauthorized penetration testing
  • ×Basic security awareness training for end users
  • ×One-off exploit development without broader campaign context
Expects

Detailed organizational context including network architecture, existing security controls, threat landscape, and specific red team engagement objectives with defined scope and constraints.

Returns

Comprehensive red team operation plan with adversary profile selection, attack scenario design, C2 infrastructure blueprints, execution timeline, and structured reporting framework with MITRE ATT&CK mappings.

Evidence Policy

Standard: no explicit evidence policy.

red-teamadversary-simulationmitre-attackpurple-teamoffensive-security

Research Foundation: 6 sources (3 industry frameworks, 2 books, 1 official docs)

This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.

Version History

v1.0.02/15/2026

Initial release

Prerequisites

Use these skills first for best results.

Works well with

Need more depth?

Specialist skills that go deeper in areas this skill touches.

Common Workflows

Comprehensive Security Validation Pipeline

End-to-end security assessment workflow from threat identification through adversary simulation to incident response capability validation

Activate this skill in Claude Code

Sign up for free to access the full system prompt via REST API or MCP.

Start Free to Activate This Skill

© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice