- Home
- Threat Management
- Threat Simulation
- Splunk Attack Range
Splunk Attack Range
An open-source platform that builds instrumented environments, simulates attacks, and integrates with Splunk for detection rule development and testing.

Splunk Attack Range
An open-source platform that builds instrumented environments, simulates attacks, and integrates with Splunk for detection rule development and testing.
Splunk Attack Range Description
Splunk Attack Range is an open-source detection development platform maintained by the Splunk Threat Research Team that builds instrumented cloud and local environments for security testing. The platform addresses three main challenges in detection engineering by providing infrastructure deployment capabilities, attack simulation functionality, and CI/CD integration for automated testing. Key features include: - Quick deployment of lab infrastructure that mimics production environments - Attack simulation using engines like Atomic Red Team and Caldera to generate realistic attack data - Seamless integration with CI/CD pipelines for automated detection rule testing - Support for both cloud (AWS) and local deployments - Docker containerization for easy deployment and management The tool forwards simulated attack data into Splunk instances, enabling security teams to develop and test the effectiveness of their detection rules in controlled environments. It supports Windows-based attack scenarios and provides comprehensive documentation for implementation and usage.
Splunk Attack Range FAQ
Common questions about Splunk Attack Range including features, pricing, alternatives, and user reviews.
Splunk Attack Range is An open-source platform that builds instrumented environments, simulates attacks, and integrates with Splunk for detection rule development and testing.. It is a Threat Management solution designed to help security teams with Threat Detection, Red Team, Automation.
FEATURED
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to build security programs
Stay Updated with Mandos Brief
Get the latest cybersecurity updates in your inbox
TRENDING CATEGORIES
POPULAR
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure