← Back to Skills
SecurityEngineeringPlatinum

Planning realistic cyber attack simulations to test security defenses.

Red Team Operations Advisor

MITRE ATT&CK, Cobalt Strike, Purple Teaming

expertv5.0

Best for

  • Design multi-phase adversary simulation campaigns against enterprise AD environments
  • Execute purple team exercises validating EDR detection capabilities against living-off-the-land techniques
  • Plan assumed breach scenarios simulating APT lateral movement and data exfiltration
  • Develop C2 infrastructure with domain fronting for stealthy long-duration engagements

What you'll get

  • Multi-phase engagement plan with reconnaissance, initial access via spear-phishing, persistence through scheduled tasks, and lateral movement using Kerberoasting, complete with C2 redirector architecture
  • Purple team exercise design document with attack timeline, blue team collaboration points, detection opportunity mapping, and specific defensive recommendations based on missed detections
  • Comprehensive red team report with step-by-step attack narrative, MITRE ATT&CK technique attribution (T1558.003, T1003.001), OPSEC failures, and prioritized remediation roadmap
Expects

Detailed organizational context including network architecture, existing security controls, threat landscape, and specific red team engagement objectives with defined scope and constraints.

Returns

Comprehensive red team operation plan with adversary profile selection, attack scenario design, C2 infrastructure blueprints, execution timeline, and structured reporting framework with MITRE ATT&CK mappings.

What's inside

You are a Red Team Operations Advisor. You design and execute adversary simulations that expose blind spots in detection, response, and architecture -- focusing on what defenders actually miss, not what frameworks say should work. - **Hunt for undetected techniques, not comprehensive coverage**. Mos...

Covers

What You Do DifferentlyMethodologyWatch For
Not designed for ↓
  • ×Traditional vulnerability scanning or compliance audits
  • ×Actual malicious attacks or unauthorized penetration testing
  • ×Basic security awareness training for end users
  • ×One-off exploit development without broader campaign context

SupaScore

89.33
Research Quality (15%)
8.85
Prompt Engineering (25%)
9.2
Practical Utility (15%)
8.55
Completeness (10%)
9.3
User Satisfaction (20%)
8.9
Decision Usefulness (15%)
8.75

Evidence Policy

Standard: no explicit evidence policy.

red-teamadversary-simulationmitre-attackpurple-teamoffensive-security

Research Foundation: 6 sources (3 industry frameworks, 2 books, 1 official docs)

This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.

Version History

v5.03/25/2026

v5.5 distilled from v2 via Claude Sonnet

v2.02/26/2026

Pipeline v4: rebuilt with 3 helper skills

v1.0.02/15/2026

Initial release

Prerequisites

Use these skills first for best results.

Works well with

Need more depth?

Specialist skills that go deeper in areas this skill touches.

Common Workflows

Comprehensive Security Validation Pipeline

End-to-end security assessment workflow from threat identification through adversary simulation to incident response capability validation

© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice