MALWARE
INTEL
Dashboard
Families
Actors
TTPs
Campaigns
Graph
Packages
IOC Search
Search
Correlations
Sources
Stats
v0.2.0
ATT&CK Techniques
Loading... — MITRE ATT&CK Explorer
All tactics
reconnaissance
resource development
initial access
execution
persistence
privilege escalation
defense evasion
credential access
discovery
lateral movement
collection
exfiltration
command and control
impact
Select a technique to view D3FEND mitigations