Skip to content

danae-pan/CyberSec

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Cybersecurity Tools and Techniques Documentation

Purpose

This repository documents various cybersecurity tools and techniques aligned with the MITRE ATT&CK framework, a globally accessible knowledge base of adversarial tactics and techniques based on real-world observations.

The repository is organized based on the phases of a cyberattack as defined by MITRE ATT&CK. Each phase, known as a "tactic," is a strategic goal that adversaries aim to achieve during their attack campaigns. The repository starts with Reconnaissance and expands to include other phases.

Current Structure

As the repository grows, additional tactics and tools will be documented.

MITRE ATT&CK Tactics

Below is a list of the primary tactics from the MITRE ATT&CK framework, each representing a specific goal or phase in an adversary's attack. Click on the tactic names to view detailed information from MITRE ATT&CK.

  1. Reconnaissance: Gathering information necessary to plan future operations.

  2. Resource Development: Establishing the infrastructure and resources required to launch attacks.

  3. Initial Access: Gaining an initial foothold within a network.

  4. Execution: Running malicious code on the target system.

  5. Persistence: Maintaining a foothold in the system, even after reboots or credential changes.

  6. Privilege Escalation: Gaining elevated permissions on a system.

  7. Defense Evasion: Avoiding detection or bypassing security controls.

  8. Credential Access: Stealing credentials like usernames and passwords.

  9. Discovery: Understanding the environment, such as network architecture, software, and users.

  10. Lateral Movement: Moving within the network to other systems.

  11. Collection: Gathering data of interest to the adversary.

  12. Command and Control: Establishing communication with compromised systems to control them.

  13. Exfiltration: Stealing data from the network.

  14. Impact: Manipulating, interrupting, or destroying systems and data.

For more information about each tactic and how adversaries use these phases in real-world attacks, visit the MITRE ATT&CK website.

Contributing

Contributions are welcome! If you have additional tools or techniques that align with the MITRE ATT&CK framework, feel free to open a pull request or raise an issue for discussion.


This repository is a work in progress, and new tools will be added as they are documented.

License

This project is licensed under the MIT License.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published