Create Attack Technique

🌐Community
by datadog · vlatest · Repository

Generate novel attack techniques based on threat intelligence and observed vulnerabilities to proactively strengthen defenses.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add create-attack-technique npx -- -y @trustedskills/create-attack-technique
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "create-attack-technique": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/create-attack-technique"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

What it does

The create-attack-technique skill allows AI agents to generate detailed attack techniques based on provided inputs. It can produce structured outputs including attacker tactics, procedures, and techniques (TPTs) that are suitable for red team operations or security assessments. The generated techniques include relevant MITRE ATT&CK mappings and considerations for execution.

When to use it

  • Red Team Planning: Generate new attack scenarios and TPTs for a planned engagement.
  • Security Assessment Preparation: Develop potential attack vectors to test the effectiveness of existing defenses.
  • Threat Intelligence Enrichment: Translate threat intelligence reports into actionable attack techniques.
  • Training & Simulation: Create realistic attack simulations for security training exercises.

Key capabilities

  • Generates detailed attack techniques.
  • Includes MITRE ATT&CK mappings.
  • Provides considerations for execution.
  • Produces structured TPT outputs.

Example prompts

  • "Create an attack technique targeting Active Directory using PowerShell."
  • "Generate a phishing attack technique leveraging social engineering principles, mapped to ATT&CK ID T1566."
  • "Develop a technique for lateral movement within a network after initial access has been achieved."

Tips & gotchas

The quality of the generated techniques depends heavily on the specificity and clarity of the prompt. Providing context about the target environment or desired attacker profile will improve results.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
datadog
Installs
5

🌐 Community

Passed automated security scans.