AAPP-MART

AI-Autonomous Attack Path Prediction & Multi-Agent Red Team Simulation Engine

AAPP-MART is an AI-Autonomous platform for attack simulation, threat modeling, and autonomous red team operations aligned with MITRE ATT&CK.

Predict. Simulate. Secure.

Get Started on GitHub

About

AAPP‑MART (AI‑Autonomous Attack Path Prediction & Multi‑Agent Red Team Simulation Engine) is an open‑source Python security engine designed for offensive security research, adversarial modeling, and automated risk assessment. It combines AI‑powered attack‑path prediction with autonomous multi‑agent red‑team simulation to model how real attackers navigate an environment and to reveal actionable, data‑driven security insights.

Unlike traditional static vulnerability scanners or manual penetration testing, AAPP‑MART uses predictive analytics, graph‑based threat modeling, and autonomous adversarial behavior to deliver continuous and realistic security evaluation. Its architecture helps defenders anticipate attack strategies, validate defensive controls, and understand real‑world risk through repeatable, scalable, and intelligence‑driven simulations.

The system generates structured attack-path reports, MITRE ATT&CK-mapped insights, and risk scoring outputs to support SOC operations, detection engineering, and continuous security improvement.

Why AAPP-MART?

AAPP-MART stands out from traditional security tools in its approach:

By combining AI-Autonomous Attack Path Prediction with Multi-Agent Red Team Simulation Engine, AAPP-MART provides organizations with a forward-looking security posture, not just reactive alerts.

Use Cases

AAPP-MART enables advanced, intelligence-driven security operations through the following core use cases:

How it Works

  1. AAPP (AI-Autonomous Attack Path Prediction)
    Evaluates assets, configurations, permissions, and vulnerabilities to predict probable attacker paths.
  2. MART (Multi-Agent Red Team Simulation Engine)
    Autonomous agents simulate realistic adversary actions: Reconnaissance, Exploitation, Lateral Movement, Privilege Escalation, Persistence, Reporting
  3. CORE Orchestration Engine
    Coordinates AAPP & MART, maintains a global knowledge graph, executes simulations, and produces structured risk reports.

Example Attack Flow:

[User Credential] → [Phishing/Exploit] → [Initial Access] → [Lateral Movement] → [Privilege Escalation] → [Critical Asset Compromise]

Architecture

The system is architected around three primary subsystems:

These subsystems operate in a tightly integrated manner through a shared attack graph (knowledge graph), enabling coordinated attack modeling, adversarial simulation, and unified risk analysis across the platform.

Legal Disclaimer

The developers and contributors of this project assume no responsibility or liability for misuse, damage, or legal consequences arising from the use of this software.

This software is provided “as is” without warranty of any kind, express or implied.

Who is this for

Features

Conceptual Usage Example

This example reflects the intended public API design:

import os
from aapp_mart.core.orchestrator import AAPP_MART

# Initialize the engine with a target IP or hostname
engine = AAPP_MART(target="")

# Run simulation
engine.run()

# Retrieve the generated attack-path report
report = engine.get_report()

# Print a concise summary of the predicted attack paths
report.export(format="json", path="./logs/attack-path/attack_report_.json")

See API Reference for interface details.

Demo

Run the AAPP-MART CLI simulation locally:

python demo/demo.py

Output Example

=== AAPP-MART Demo ===
[!] Running in DEMO MODE (package not installed)

[+] Target: 192.168.1.10
[+] Simulating attack path prediction...
[+] Running adversarial simulation...
[✓] Simulation completed
[+] Report exported → ./logs/attack-path/attack_report_192.168.1.10.json

Run on Google Colab

Launch the interactive demo here:

Attack Path Demo Notebook on Google Colab

Colab Output

Environment is ready for AAPP-MART demo.
Simulating attack path prediction for target: 192.168.1.10
Report exported in json format to ./logs/attack-path/attack_report_192.168.1.10.json
NOTE:

DEMO: This IP/hostname is an example target. You will write the actual target IP/hostname yourself in the main project.

Installation

Supported Operating Systems

Requirements

Quick Start

# Clone repo
git clone https://github.com/secwexen/aapp-mart.git
cd aapp-mart

# Create virtual environment
python -m venv venv
source venv/bin/activate  # Linux/Mac
venv\Scripts\activate     # Windows

# Install dependencies
pip install -r requirements.txt

# Install dev dependencies
pip install -r dev-requirements.txt

For full details, refer to the Quick Start file.

Docs & Resources

Community & Support

Contribute code, documentation, or testing. CONTRIBUTING.

Join Discussions to share feedback and proposals.

Check out for tasks and ideas. Open an issue.