Detecting ATT&CK techniques & tactics for Linux
incident-response
red-team
blue-team
mitre-attack
defensive-security
security-operations
threathunting
linux-hunting
-
Updated
Oct 1, 2020 - Roff
Detecting ATT&CK techniques & tactics for Linux
Add a description, image, and links to the linux-hunting topic page so that developers can more easily learn about it.
To associate your repository with the linux-hunting topic, visit your repo's landing page and select "manage topics."