This document discusses PurpleSharp, an open source adversary simulation tool written in C# that executes adversary techniques within Windows Active Directory environments following the ATT&CK MITRE Framework. PurpleSharp allows detection teams to build and test detection analytics, validate detection resiliency, identify gaps in visibility, verify prevention controls, and more. The document provides information on what PurpleSharp is, why it is useful, and how to access it from GitHub or its documentation site. It also previews two demos of PurpleSharp techniques for execution/persistence and discovery/defense evasion.