MITRE | ATT%CK research


1. Reconnaissance

2. Resource Development

3. Initial Access

4. Execution

5. Persistence

6. Privilege Escalation

7. Defense Evasion

8. Credential Access

9. Discovery

10. Lateral Movement

11. Collection

12. Command and Control

13. Exfiltration

14. Impact

Tools


Cybersecurity tools - Testing

The C2 Matrix

Red Team Infrastructure

Remote access tools

Remote execution tools

Complex function tools

Data exfiltration tools

Specialized study

Powered by Fruition