Skip to content

enriquesanchez-elastic/security-documents-generator

Β 
Β 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

219 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Security Documents Generator

A powerful tool for generating realistic security scenarios with complete forensic evidence chains. Features AI-powered data generation, MITRE ATT&CK integration, and realistic attack campaign simulation with source logs that trigger alerts.

🌟 Key Features

  • 🏒 AI4SOC Platform Support: Generate alerts for Splunk, SentinelOne, and Google SecOps
  • 🌍 Multi-Environment Generation: Scale across 100s-1000s of simulated environments
  • πŸ”¬ Multi-Field Generation: Up to 50,000 additional security fields per document
  • βš”οΈ Advanced MITRE Integration: Sub-techniques, attack chains, and tactic focusing
  • πŸ‘οΈ Visual Event Analyzer Integration: Linux process events with full correlation support
  • 🎯 False Positive Testing: Generate realistic false positives for rule tuning
  • πŸ—£οΈ MCP Server Support: Conversational interface for enterprise-scale generation

πŸš€ Quick Start

  1. Install dependencies:

    yarn install
  2. Initialize configuration:

    yarn start

    Follow the guided setup to create your config.json file.

  3. Generate detection rules and attack scenarios:

    # Generate detection rules (all types)
    yarn start rules -r 10 -s default
    
    # Complete ransomware attack with realistic logs β†’ alerts pipeline
    yarn start generate-campaign ransomware --realistic --mitre --detection-rate 0.6

πŸ“‹ Essential Commands

Command Description Example
rules --rule-types πŸ›‘οΈ Detection rules (all types) yarn start rules -r 15 --rule-types query,threshold,eql -s default
generate-alerts --environments 🌍 Multi-environment alerts yarn start generate-alerts -n 100 --environments 50 --namespace prod
generate-logs --environments 🌍 Multi-environment logs yarn start generate-logs -n 1000 --environments 25 --namespace staging
generate-campaign --realistic 🌟 Complete attack scenarios yarn start generate-campaign apt --realistic --mitre
--theme <theme> 🎨 Theme-based data generation yarn start generate-alerts -n 100 --theme marvel --mitre
generate-fields πŸ”¬ Generate fields on demand yarn start generate-fields -n 4000 --categories behavioral_analytics
generate-alerts --multi-field πŸ”¬ Alerts with 10,000+ fields yarn start generate-alerts -n 100 --multi-field --field-count 10000
--visual-analyzer πŸ‘οΈ Visual Event Analyzer support yarn start generate-alerts -n 50 --visual-analyzer --mitre
--ai4soc --platform 🏒 AI4SOC platform alerts yarn start generate-alerts -n 20 --ai4soc --platform splunk --mitre

πŸ—‘οΈ Cleanup Commands

Command Description
delete-alerts Clean up generated alerts
delete-logs Clean up source logs
delete-rules Clean up detection rules
delete-cases Clean up security cases
delete-knowledge-base Clean up knowledge base documents
delete-ai4soc-mappings Clean up AI4SOC indices and templates
delete-all Delete all generated data

🎨 Theme-Based Data Generation

🎭 Generate Consistent Themed Security Data

Transform boring test data into engaging, memorable scenarios while maintaining security realism:

# Marvel superhero-themed security data
yarn start generate-campaign apt --theme marvel --realistic --mitre
# Creates: tony.stark@starkindustries.com, shield-web-01, avengers-sql-02

# Star Wars-themed enterprise deployment
yarn start generate-alerts -n 100 --theme starwars --mitre --multi-field
# Creates: luke.skywalker@rebels.org, jedi-api-01, death-star-db-03

# NBA-themed SOC training environment
yarn start generate-logs -n 1000 --theme nba --types system,auth,network
# Creates: lebron.james@lakers.com, warriors-mail-01, bulls-app-02

🎯 Supported Themes (19 Total)

Category Themes Example Data
Sports nba, nfl, soccer, mlb lebron.james, patriots-web-01, messi.lionel
Entertainment marvel, starwars, movies, tv_shows, anime tony.stark, jedi-db-02, naruto.uzumaki
Technology tech_companies, programming satya.nadella, google-api-01, python-srv-03
Culture mythology, literature, history, music, food zeus.olympus, shakespeare-web-01, beethoven.ludwig

πŸ“Š Themed Data Types

Every aspect of your security data follows the selected theme:

Data Type Purpose Example (Marvel Theme)
Usernames User accounts, authentication logs tony.stark, peter.parker, steve.rogers
Hostnames Server names, network devices iron-web-01, spider-db-02, shield-mail-03
Full Names Employee records, audit logs Tony Stark, Peter Parker, Steve Rogers
Emails Communication logs, phishing scenarios tony.stark@starkindustries.com
Organizations Company names, department data Stark Industries Security, SHIELD Operations
Process Names Endpoint security, malware analysis StarkSecurityService, ShieldLogService
File Names Document analysis, forensics arc-reactor-plans.pdf, shield-protocols.doc
File Paths System monitoring, file integrity C:\Stark\Designs\mark42.dwg
Registry Keys Windows forensics, persistence analysis HKLM\Software\Stark\Armor
URLs Web traffic analysis, threat hunting /api/stark/inventory, /shield/classified
IP Addresses Network analysis, threat intelligence 192.168.10.1 (Stark HQ), 172.16.0.7 (SHIELD)
Application Names Software inventory, security tools Stark Analyzer, Shield Monitor
Service Names Service monitoring, process analysis AvengersNetService, GammaMonitorService
Event Descriptions SIEM alerts, security notifications Stark security protocol engaged

πŸš€ Theme Integration Examples

🦸 Marvel APT Campaign

yarn start generate-campaign apt --theme marvel --realistic --mitre --detection-rate 0.8

Result: Complete APT scenario with Marvel-themed entities:

  • Initial Access: peter.parker@dailybugle.com receives phishing email
  • Execution: Malware executes on spider-web-01.dailybugle.com
  • Persistence: Registry key HKLM\Software\WebSlinger\Config modified
  • Collection: Data stolen from C:\Stark\Classified\reactor-specs.pdf
  • Exfiltration: Data sent to external IP via GammaMonitorService

⚽ Soccer SOC Training

yarn start generate-logs -n 2000 --theme soccer --types system,auth,network,endpoint

Result: Comprehensive logs with soccer theme:

  • Authentication: messi.lionel failed login on barcelona-dc-01
  • Network: Suspicious traffic from real-madrid-web-02 to external IP
  • Process: ChampionsLeagueService consuming high CPU
  • File: Access denied to \\fifa-share\world-cup-plans.xlsx

🌟 Star Wars Multi-Environment

yarn start generate-alerts -n 500 --theme starwars --environments 10 --multi-field --field-count 300

Result: 10 environments with consistent Star Wars theming:

  • Environments: jedi-env-001 through empire-env-010
  • Hosts: tatooine-web-01, coruscant-db-02, death-star-api-03
  • Users: luke.skywalker@rebels.org, vader@empire.gov
  • Enhanced Fields: 300 additional security fields per alert

🧠 AI Assistant Knowledge Base

🎯 Security Knowledge Documents for AI Assistant

Generate comprehensive security knowledge documents optimized for Elastic AI Assistant integration:

# Generate comprehensive security knowledge base
yarn start generate-knowledge-base -n 30 --categories threat_intelligence,incident_response,vulnerability_management

# High-confidence public security documentation
yarn start generate-knowledge-base -n 25 --access-level public --confidence-threshold 0.9

# Knowledge base with MITRE ATT&CK framework integration
yarn start generate-knowledge-base -n 20 --mitre --categories malware_analysis,forensics

πŸ“š Knowledge Base Categories

  • threat_intelligence - IOC analysis, APT profiles, campaign tracking, attribution
  • incident_response - Playbooks, procedures, escalation matrices, communication
  • vulnerability_management - CVE analysis, patch management, assessment reports
  • network_security - Firewall rules, IDS signatures, traffic analysis, DNS security
  • endpoint_security - EDR rules, behavioral patterns, process monitoring
  • cloud_security - AWS/Azure/GCP security, container monitoring, serverless analytics
  • compliance - PCI DSS, SOX, GDPR, HIPAA, ISO27001 frameworks
  • forensics - Memory analysis, disk forensics, network forensics, timeline analysis
  • malware_analysis - Static/dynamic analysis, reverse engineering, sandbox reports
  • behavioral_analytics - User analytics, entity analytics, anomaly detection

πŸ” Key Features

  • ELSER v2 Integration: Semantic text fields optimized for AI Assistant
  • Suggested Questions: AI-optimized questions for each document category
  • MITRE ATT&CK Mapping: Technique and tactic associations
  • Confidence Scoring: Quality assessment from 0.6-1.0
  • Access Control: Multi-level restrictions (public, team, organization, restricted)
  • Rich Console Output: Document titles, confidence indicators, and suggested questions

πŸ’¬ Example Generated Content

πŸ“‹ Generated Knowledge Base Documents:
  1. πŸ”₯ πŸ‘₯ [threat_intelligence/ioc_analysis] IOC Analysis: MALWARE-7426
     πŸ’¬ Suggested AI Assistant Questions:
        1. What IOCs should we immediately block in our environment?
        2. How confident are we in the attribution of this threat?
        3. What detection rules should we create based on these indicators?

  2. βœ… 🏒 [incident_response/playbooks] IR Playbook: Ransomware Incident Response
     πŸ’¬ Suggested AI Assistant Questions:
        1. What are the key decision points in this incident response process?
        2. How do we customize this playbook for our environment?
        3. What tools and resources are required for each phase?

πŸ“š Full Knowledge Base Documentation β†’

🏒 AI4SOC Platform Support

🎯 Multi-Platform Security Alert Generation

Generate realistic, platform-specific security alerts for major SIEM and security platforms:

# Splunk alerts with MITRE integration
yarn start generate-alerts -n 15 --ai4soc --platform splunk --mitre

# SentinelOne alerts with themed data
yarn start generate-alerts -n 10 --ai4soc --platform sentinelone --theme marvel

# Google SecOps alerts with multi-field enrichment  
yarn start generate-alerts -n 20 --ai4soc --platform google-secops --multi-field

# All platforms with complete integration
yarn start generate-alerts -n 30 --ai4soc --platform all --mitre --theme starwars

πŸ›‘οΈ Supported Platforms

Platform Format Key Features Example Use Case
Splunk Event-based Severity scoring, file access events, process execution _time, event.title, severity_score, file_path
SentinelOne Agent-centric Process creation, threat classification, endpoint details threatInfo, agentDetectionInfo, processDisplayName
Google SecOps Finding-based Asset information, security marks, risk scoring alert.finding, entity.asset, riskScore

πŸ”§ Platform Management Commands

# Setup AI4SOC indices and templates (one-time)
yarn start setup-ai4soc-mappings

# Check AI4SOC platform status
yarn start ai4soc-status  

# Cleanup AI4SOC indices and templates
yarn start delete-ai4soc-mappings

πŸ“‹ AI4SOC Index Patterns

Each platform creates dedicated indices for proper data organization:

  • Splunk: ai4soc-splunk-* β†’ Raw events with severity scoring
  • SentinelOne: ai4soc-sentinelone-* β†’ Agent detection and threat data
  • Google SecOps: ai4soc-google-secops-* β†’ Findings with asset context
  • All Platforms: ai4soc-*-* β†’ Cross-platform analysis

πŸš€ AI4SOC Integration Examples

🏒 Multi-Platform SOC Training

# Generate training data across all platforms
yarn start generate-alerts -n 50 --ai4soc --platform all --mitre

# Platform-specific investigation scenarios
yarn start generate-alerts -n 25 --ai4soc --platform splunk --theme marvel --visual-analyzer
yarn start generate-alerts -n 25 --ai4soc --platform sentinelone --mitre --multi-field
yarn start generate-alerts -n 25 --ai4soc --platform google-secops --theme nba

πŸ“Š Cross-Platform Correlation Analysis

# Generate correlated alerts across platforms for same incident
for platform in splunk sentinelone google-secops; do
  yarn start generate-alerts -n 10 --ai4soc --platform $platform --mitre --theme starwars
done

🎯 AI4SOC Event Types

Each platform generates realistic security events:

Event Type Splunk Format SentinelOne Format Google SecOps Format
File Access event.type: file_access
file_path, access_type
threatInfo.filePath
threatInfo.processDisplayName
src_file.path
process.name
Process Creation process_command
parent_process
threatInfo.processDisplayName
threatInfo.commandline
process.command_line
parent_process.name
Network Access network.src_ip
network.dest_port
Container/K8s context network.sourceIp
network.protocol

πŸ€– Machine Learning Anomaly Detection

🎯 Enterprise ML Data Generation

Generate realistic ML training data for Elastic Security Machine Learning jobs across all security domains:

# Generate authentication anomaly data
yarn start generate-ml-data --modules security_auth,security_linux

# Complete ML workflow: create jobs + generate training data
yarn start generate-ml-data --modules security_auth,security_windows --enable-jobs

# Enterprise scale: all modules with performance optimization
yarn start generate-ml-data --modules security_auth,security_linux,security_windows,security_network,security_packetbeat,security_cloudtrail --chunk-size 5000

πŸ“Š ML Security Modules

  • security_auth - Authentication anomalies (rare users, failed logins, unusual timing)
  • security_linux - Linux system anomalies (unusual users, sudo activity, network patterns)
  • security_windows - Windows anomalies (process creation, runas events, script execution)
  • security_cloudtrail - AWS CloudTrail anomalies (error patterns, API methods, geographic)
  • security_network - Network anomalies (high volume, rare destinations, unusual processes)
  • security_packetbeat - Traffic anomalies (DNS queries, server domains, URL patterns)

πŸš€ ML-Enhanced Detection Rules

Integrate ML jobs directly with detection rule generation:

# Generate ML rules with automatic training data
yarn start rules -r 10 -t machine_learning --generate-ml-data --ml-modules security_auth,security_windows

# Complete ML-powered SOC setup: rules + jobs + data
yarn start rules -r 20 -t query,threshold,machine_learning --enable-ml-jobs --generate-ml-data --ml-modules security_auth,security_cloudtrail,security_network

# Enterprise ML testing across multiple spaces
yarn start rules -r 15 --enable-ml-jobs --generate-ml-data --ml-modules security_auth,security_windows,security_linux -s ml-testing

πŸ” ML Analysis Functions

  • rare - Detects rare field values (unusual usernames, rare processes)
  • high_count - Identifies volume anomalies (authentication spikes, network floods)
  • high_distinct_count - Finds diversity anomalies (error message variety)
  • high_info_content - Detects entropy anomalies (encoded commands, scripts)
  • time_of_day - Identifies temporal anomalies (unusual login hours)

πŸ“ˆ Key Features

  • 21 Pre-built ML Jobs: Complete coverage across security domains
  • Realistic Anomaly Injection: 0.02%-0.08% anomaly rates matching production
  • Context-Aware Generation: Field patterns specific to security domains
  • Enterprise Scale: Generate 100k+ documents with performance optimization
  • Rule Integration: ML jobs automatically connected to detection rules

πŸ‘οΈ Visual Event Analyzer Integration

πŸ”— Linux Process Events with Full Correlation Support

Generate alerts with correlated process events for Elastic Security's Visual Event Analyzer. Each alert includes matching process events that create complete process trees and attack visualizations.

# Generate alerts with Visual Event Analyzer support
yarn start generate-alerts -n 20 --visual-analyzer

# Combine with MITRE ATT&CK for realistic attack scenarios
yarn start generate-alerts -n 50 --visual-analyzer --mitre

# Generate attack campaigns with process visualization
yarn start generate-campaign apt --visual-analyzer --realistic

# Generate logs with Linux process hierarchies
yarn start generate-logs -n 100 --visual-analyzer --types endpoint

🐧 Linux Process Hierarchy Generation

Realistic Linux attack scenarios with parent-child process relationships:

  • πŸ”“ Privilege Escalation: bash β†’ sudo β†’ su β†’ bash
  • 🌐 Lateral Movement: ssh β†’ python3 β†’ bash β†’ nc
  • πŸ”„ Persistence: crontab β†’ vim β†’ bash β†’ crontab
  • πŸ” Discovery: ps β†’ netstat β†’ find β†’ cat
  • πŸ“€ Data Exfiltration: find β†’ tar β†’ curl β†’ rm

πŸ“Š Visual Event Analyzer Requirements

Generated data includes all required fields for Visual Event Analyzer functionality:

  • βœ… agent.type: "endpoint" - Proper agent type configuration
  • βœ… process.entity_id - Unique process entity identifiers
  • βœ… event.category: "process" - Correct event categorization
  • βœ… Alert correlation - Alerts reference existing process events
  • βœ… Process trees - Parent-child process relationships
  • βœ… MITRE mapping - ATT&CK technique associations

🎯 Key Features

  • Perfect Correlation: Each alert has matching process events with identical process.entity_id
  • Realistic Process Chains: Linux-specific attack progression patterns
  • Automatic Generation: Process events created automatically with alerts
  • Multi-Environment Support: Works with --environments flag for scale testing
  • MITRE Integration: Process chains mapped to proper ATT&CK techniques

πŸ” Kibana Integration

After generation, alerts in Kibana Security will show:

  • βœ… Visual Event Analyzer icon in the alerts table
  • βœ… Process tree visualization when clicking the analyzer icon
  • βœ… Complete attack chains with process relationships
  • βœ… Linux process hierarchies showing realistic attack progression

πŸŽͺ Realistic Attack Scenarios

🎭 Complete SOC Training Scenarios

# Realistic APT campaign: 18 source logs β†’ 0 detected alerts (stealth attack)
yarn start generate-campaign apt --realistic --mitre --logs-per-stage 3 --detection-rate 0.3

# Ransomware outbreak: 38 source logs β†’ 12 detected alerts (high visibility)
yarn start generate-campaign ransomware --realistic --mitre --logs-per-stage 2 --detection-rate 0.8

# Insider threat: Gradual privilege abuse with low detection
yarn start generate-campaign insider --realistic --mitre --detection-rate 0.2

# πŸ”¬ Enhanced with Multi-Field Generation
# APT campaign with 400 additional behavioral and threat intelligence fields
yarn start generate-campaign apt --realistic --mitre --multi-field --field-count 400 \
  --field-categories behavioral_analytics,threat_intelligence,endpoint_analytics

# Ransomware with full security context (500+ fields per event)
yarn start generate-campaign ransomware --realistic --mitre --multi-field --field-count 500

πŸ” What You Get:

  • Source Logs: Realistic Windows/Linux logs that tell the attack story
  • Triggered Alerts: Security alerts generated from suspicious log patterns
  • Missed Activities: Realistic gaps in detection (like real SOCs)
  • Investigation Timeline: Chronological attack progression
  • Investigation Guide: Step-by-step analysis recommendations

πŸ“Š Example Output:

🎊 Realistic Campaign Generated Successfully:
  🎯 Attack Stages: 8
  βš”οΈ  Campaign: Conti Enterprise Ransomware Campaign
  🎭 Threat Actor: Conti
  πŸ“‹ Total Logs: 38
  🚨 Detected Alerts: 12
  βšͺ Missed Activities: 2
  πŸ“… Timeline: 45 events

πŸ“– Investigation Guide:
  1. Review initial alerts and identify affected systems
  2. Investigate supporting logs around alert times
  3. Look for lateral movement and persistence

πŸ“ View in Kibana space: default
πŸ” Filter logs with: logs-*
🚨 View alerts in Security app
πŸ“ˆ 12 alerts triggered by 38 source logs

πŸ”§ Configuration

Create config.json with your connection and AI provider settings:

πŸ” Authentication Options

API Key Authentication (Recommended - Default)

Secure authentication for Elastic Cloud, Serverless, and production environments:

{
  "elastic": {
    "node": "https://your-cluster.es.us-west2.gcp.elastic-cloud.com",
    "apiKey": "VnVhQ2ZHY0JDdbkQm-e5aM..."
  },
  "kibana": {
    "node": "https://your-kibana.kb.us-west2.gcp.elastic-cloud.com:9243",
    "apiKey": "VnVhQ2ZHY0JDdbkQm-e5aM..."
  },
  "serverless": true
}

πŸ“ How to obtain API keys:

  1. Elastic Cloud: Stack Management β†’ Security β†’ API Keys β†’ Create API Key
  2. Kibana Dev Tools:
    POST /_security/api_key
    {
      "name": "security-docs-generator",
      "role_descriptors": {
        "security_role": {
          "cluster": ["all"],
          "index": [{"names": ["*"], "privileges": ["all"]}]
        }
      }
    }
  3. Serverless: Use the pre-configured service tokens from your serverless environment

Username/Password Authentication

For local development and self-hosted deployments:

{
  "elastic": {
    "node": "http://localhost:9200",
    "username": "elastic",
    "password": "changeme"
  },
  "kibana": {
    "node": "http://localhost:5601",
    "username": "elastic",
    "password": "changeme"
  }
}

Serverless Development

For local serverless development (using yarn es serverless):

{
  "elastic": {
    "node": "https://localhost:9200",
    "username": "elastic_serverless",
    "password": "changeme"
  },
  "kibana": {
    "node": "https://localhost:5601",
    "apiKey": "AAEAAWVsYXN0aWMva2liYW5hL2tpYmFuYS1kZXY6VVVVVVVVTEstKiBaNA"
  },
  "serverless": true
}

πŸ€– AI Provider Configuration

OpenAI

{
  "elastic": { "node": "https://your-cluster.com", "apiKey": "..." },
  "kibana": { "node": "https://your-kibana.com", "apiKey": "..." },
  "useAI": true,
  "openaiApiKey": "sk-..."
}

Claude (Anthropic)

{
  "elastic": { "node": "https://your-cluster.com", "apiKey": "..." },
  "kibana": { "node": "https://your-kibana.com", "apiKey": "..." },
  "useAI": true,
  "useClaudeAI": true,
  "claudeApiKey": "sk-ant-..."
}

Azure OpenAI

{
  "elastic": { "node": "https://your-cluster.com", "apiKey": "..." },
  "kibana": { "node": "https://your-kibana.com", "apiKey": "..." },
  "useAI": true,
  "useAzureOpenAI": true,
  "azureOpenAIApiKey": "...",
  "azureOpenAIEndpoint": "https://your-resource.openai.azure.com/",
  "azureOpenAIDeployment": "gpt-4"
}

🎯 Campaign Types

Type Attack Stages Key Characteristics Detection Rate
APT 2-4 stages Stealth, lateral movement, long-term Low (0.2-0.4)
Ransomware 8 stages Fast progression, high impact High (0.6-0.9)
Insider 3-6 stages Privilege abuse, data exfiltration Medium (0.3-0.6)
Supply Chain 4-7 stages External compromise, multiple victims Medium (0.4-0.7)

πŸ› οΈ Advanced Usage

# High detection environment (well-monitored SOC)
yarn start generate-campaign apt --realistic --detection-rate 0.8 --logs-per-stage 5

# Stealth attack (limited visibility)
yarn start generate-campaign apt --realistic --detection-rate 0.2 --logs-per-stage 8

# Large-scale incident
yarn start generate-campaign ransomware --realistic --events 50 --targets 20 --logs-per-stage 10

πŸ” Investigation & Analysis

In Kibana:

  1. Logs: Filter by logs-* to see all source logs
  2. Alerts: Check Security app for triggered alerts
  3. Timeline: View chronological attack progression
  4. Correlation: Follow investigation guide recommendations

Key Investigation Queries:

# View all logs from affected hosts
host.name:(ws-123 OR srv-456) AND @timestamp:[now-24h TO now]

# Find authentication events around alert times
event.category:authentication AND event.outcome:success

# Look for lateral movement indicators
event.category:network AND destination.ip:10.* AND source.ip:external

πŸ“š Documentation

Topic Description
πŸ›‘οΈ Detection Rules Generation All 7 rule types with triggered alerts ⭐
πŸ”— Kibana Cloud Integration Direct Security β†’ Alerts integration ⭐
🎨 Theme-Based Generation Consistent themed security data
Multi-Field Generation 500+ security fields, zero tokens
πŸ€– Machine Learning Integration ML anomaly detection and training data
Use Cases Guide Enterprise scenarios and workflows
False Positives Detection rule testing and SOC training
Attack Campaigns Campaign generation guide
MITRE ATT&CK Framework integration
AI Integration AI providers and setup
Configuration System configuration
API Reference Complete API documentation

πŸŽ‰ Benefits

  • Realistic Training: Complete attack scenarios with proper evidence chains
  • Detection Testing: Validate rules against realistic attack patterns with 500+ contextual fields
  • SOC Training: Practice investigation workflows on believable data with rich telemetry
  • Enhanced Context: Multi-field generation provides comprehensive security analytics
  • Integration Testing: Test security tools with realistic data volumes and field diversity
  • Performance Testing: Validate systems under realistic security loads with hundreds of fields
  • Rule Development: Create detection rules with comprehensive test data
  • Cost Efficiency: 99% token reduction while maintaining data richness

🀝 Contributing

  1. Fork the repository
  2. Create a feature branch
  3. Make your changes
  4. Add tests and documentation
  5. Submit a pull request

πŸ“ License

MIT License - see LICENSE for details.


🎭 Ready to simulate realistic security incidents? Start with:

# Complete attack scenario with forensic evidence chains
yarn start generate-campaign ransomware --realistic --mitre

# Enhanced with 300 additional security fields (99% faster, zero tokens)
yarn start generate-campaign ransomware --realistic --mitre --multi-field --field-count 300

# 🎨 Marvel-themed SOC training with realistic attack progression
yarn start generate-campaign apt --theme marvel --realistic --mitre --multi-field --field-count 400

πŸ”¬ Experience the power of multi-field generation! Generate hundreds of contextual security fields in milliseconds with zero AI overhead.

About

Generate fake security data for testing

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • TypeScript 83.4%
  • JavaScript 16.6%