Untitled conversation
ATT&CK Mate
3.86
(7)
1K+
Conversations
Ask me anything about the ATT&CK
What are the latest Initial Access techniques?
What threat actors modify GPOs to execute code?
What are the top 5 data sources for ICS techniques?
Create a bar chart of top 10 techniques vs # of groups