Skip to the content.

GNAT-o-sphere / readiness testing

RedGNAT

Continuous Automated Readiness Testing (CART) addon for the GNAT-o-sphere: ingest live threat intelligence from GNAT and SandGNAT, build scoped adversary-emulation scenarios, execute them under layered safety controls, and feed detection gaps back into GNAT as structured intelligence requirements.

Source: github.com/wrhalpin/RedGNAT.

RedGNAT logo

Documentation

Organised with the Diátaxis framework. Four quadrants for four kinds of reader intent:

  Action (doing) Study (reading)
Learning Tutorials Explanation
Working How-to guides Reference

Start here if you’re…


What RedGNAT does, end to end

  1. IntakeGNATSubscriber polls GNAT for new campaigns and TTPs; SandGNATSubscriber polls SandGNAT for fresh STIX behavioral bundles.
  2. NormaliseIntelNormalizer maps STIX AttackPattern objects to registered Technique classes and builds an ordered EmulationScenario.
  3. ExecuteEmulationRunner dispatches each technique via Celery, enforcing scope, dry-run, and rate-limit controls at every step.
  4. Report gapsGapReporter converts undetected techniques into STIX 2.1 Note objects and pushes them back to GNAT as intelligence requirements.
  5. Generate probesProbeGenerator calls GNAT’s LLMClient (Claude) with gap context; suggests follow-on techniques as ProbeRequest objects.
  6. Repeat — probe tasks re-enter the same pipeline, deepening coverage until detected or the runaway guard trips.

Full architecture diagrams and component breakdown in explanation/architecture.

Key design choices

The GNAT-o-sphere

RedGNAT is one part of a family of standalone capabilities that extend GNAT without modifying it.

Core Platform

GNAT

The hub platform for threat intelligence. 159 connectors, STIX 2.1 modeling, AI agents, investigations, and workflow automation.

Learn more
Interface

GNAT-gui

Analyst-facing React SPA for GNAT — investigation management, seed-driven evidence graphs, Hy/YAML/Prolog rules, full RBAC, and real-time SSE streaming.

Learn more
Addon

SandGNAT

Automated malware sandbox — detonate binaries in isolated Windows VMs, capture behavioral artifacts, emit STIX 2.1 objects.

Learn more
Addon

SenseGNAT

Network profiling and behavior analysis that surfaces anomalies and enriches GNAT investigations with traffic-layer context using network sensor and honeypot telemetry — high-volume ingestion from Kafka topics, Redis dedup, automatic campaign linking.

Learn more

Canonical Workflow

Collect Telemetry & Sources

External indicators and raw network telemetry enter the ecosystem

Process GNAT

Ingest, normalize, convert to STIX, and route to addons

SenseGNAT

Behavioral profiling & anomaly detection

SandGNAT

Malware detonation & artifact enrichment

RedGNAT

Adversary emulation & validation

Report Investigate & Act

Unified investigation graph, reporting, and operator action

View full diagram → Read the workflow doc →

Status

v0.1.0 — Phase 1 (emulation and probing) and Phase 2 engagement infrastructure shipped. See releases/v0.1.0.

Licensed under Apache 2.0.