- Home
- Tools
- Threat Management
- Threat Simulation
- Splunk Attack Range
Splunk Attack Range
An open-source platform that builds instrumented environments, simulates attacks, and integrates with Splunk for detection rule development and testing.

Splunk Attack Range
An open-source platform that builds instrumented environments, simulates attacks, and integrates with Splunk for detection rule development and testing.
Splunk Attack Range Description
Splunk Attack Range is an open-source detection development platform maintained by the Splunk Threat Research Team that builds instrumented cloud and local environments for security testing. The platform addresses three main challenges in detection engineering by providing infrastructure deployment capabilities, attack simulation functionality, and CI/CD integration for automated testing. Key features include: - Quick deployment of lab infrastructure that mimics production environments - Attack simulation using engines like Atomic Red Team and Caldera to generate realistic attack data - Seamless integration with CI/CD pipelines for automated detection rule testing - Support for both cloud (AWS) and local deployments - Docker containerization for easy deployment and management The tool forwards simulated attack data into Splunk instances, enabling security teams to develop and test the effectiveness of their detection rules in controlled environments. It supports Windows-based attack scenarios and provides comprehensive documentation for implementation and usage.
Splunk Attack Range FAQ
Common questions about Splunk Attack Range including features, pricing, alternatives, and user reviews.
Splunk Attack Range is An open-source platform that builds instrumented environments, simulates attacks, and integrates with Splunk for detection rule development and testing.. It is a Threat Management solution designed to help security teams with Red Team, Splunk, Blue Team.