Simple and safe real-world attack chains that make threat intelligence actionable.

Every week, the Prelude team designs, builds and chains together TTPs. These chains, which mimic real-world cyberattacks, can be safely used to test your internal defenses. These chains are all usable in Prelude Operator. Download for free.
Download Operator (1.7.0)

Recent Chains


Is this host protected from LockBit?

2022-12-06

/static/assets/windows-logo.svg
Is this host protected from LockBit?
Is my Kubernetes pod protected against host mounting?

2022-11-29

/static/assets/linux-logo.svg
Escape Kubernetes Pod via host filesystem mounting.
Is CVE-2022-36804 patched on Atlassian Bitbucket Server?

2022-11-22

/static/assets/terminal-logo.svg
A TTP that exploits CVE-2022-36804 in Atlassian Bitbucket Server.
Is my Docker daemon vulnerable to privilege escalation?

2022-11-15

/static/assets/linux-logo.svg
Privilege escalation through exposed Docker daemon.
Is my Docker container vulnerable to cgroup controller escapes?

2022-11-08

/static/assets/linux-logo.svg
Escape Docker container via cgroup controller.
Is my Docker container vulnerable to host filesystem mounting?

2022-11-01

/static/assets/linux-logo.svg/static/assets/apple-logo.svg
Escape Docker container by mounting host filesystem.
Is my Docker container vulnerable to a Docker socket escape?

2022-10-25

/static/assets/linux-logo.svg
Escape a Docker container that has the Docker socket mounted.
Is CVE-2022-35914 patched on this host?

2022-10-18

/static/assets/linux-logo.svg
A TTP that exploits CVE-2022-35914 in GLPI HTMLAWED
Is Atlassian Bitbucket Server or Data Center patched against CVE-2022-36804?

2022-10-10

/static/assets/linux-logo.svg
Atlassian Bitbucker Server and Data Center code injection vulnerability