FortiTester Mitre ATT&CK has the ability to simulate adversarial attacks upon your enterprise network while remaining in a controlled environment. ATT&CK does not just send attacks. It actually can allow your network to simulate what it would be like were it to already be compromised by an attack; for example, the software is already on your network and is collecting your credentials, lateral movements etc.
Credential dumping
Uses Mimikatz to dump all windows login across ALL domain machines.
Scheduled task
Attacker schedules tasks to run, not just on the desktop, but on a higher value target like Windows Server.
Exfiltrate files
Attacker will extract information/files out of victims' PCs.
Running Powershell
Run Powershell program on victims' PC, which is a common technique used in attacks.
Execution via Win API
Use Win API to run code on victims' PC.