Dive into the world’s largest library of red-teaming test cases, curated from real adversarial operations and rebuilt locally via the `scripts/build_dashboard.mjs` pipeline. Regenerate this static snapshot whenever the CSV changes, then ship the intel anywhere without relying on external services.
Each test case originates from a deep analysis of every Darknet Diaries episode, reframed through a breach-and-attack simulation lens so you can replay the exact tradecraft adversaries have used in the wild. The mapping from raw narratives to structured cases is largely automated, and manual review happens only when time permits.
Disclaimer: this dataset is for lawful, defensive security research only. Because the content is machine-generated from public stories, it may include inaccuracies, deprecated techniques, or references to real individuals, companies, governments, or countries. Nothing here should be treated as an endorsement, accusation, or instruction to target any entity; you are solely responsible for vetting every scenario, redacting sensitive details, obtaining proper authorization, and ensuring compliance with all applicable laws and policies before use.
Review the primary legal notice at chintangurjar.com/disclaimer for the complete disclaimer that governs this project.
| Category | Test Case | MITRE ATT&CK |
|---|---|---|
| Loading data… | ||