Purple Team
Here are Purple Team validation use cases — scenarios where Red Team tactics are directly used to test or validate Blue Team defenses (SIEM, IDS/IPS, EDR, etc). Each use case includes the Red Team action, the expected Blue Team detection, and the log/artifact source


Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Credential Dumping (LSASS Access)
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Brute-Force Login Attack
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Phishing + Payload Execution
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Suspicious PowerShell (Living off the Land)
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Lateral Movement (WMI, PsExec)
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
DNS Tunneling
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Reverse Shell via HTTP/S
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Malware Dropper Detection
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Command & Control (C2) Persistence
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Data Exfiltration over HTTPS
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Purple Team Playbook
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Purple Team Curriculum
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Scapy
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
LOIC / HOIC
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
SQLmap
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Aircrack-ng
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Hydra
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Bettercap
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
CrackMapExec
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
sshuttle
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Covenant
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Social-Engineer Toolkit
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
John the Ripper (JTR)
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates
























Beginner
Host Discovery
Port Scanning
Service Version Detection
OS Fingerprinting
Quick Scan


Advanced
Our architecture services prioritize function and form to create spaces that stand the test of time.
Empire / Starkiller (PowerShell-based C2)
Beginner
SYN Scan (Stealth)
UDP Scan
Idle Scan (Zombie)
Fragment Packets
Timing Templates























