RESOURCES DATABASE

SUCCESSFUL LOGIN DETECTED - WELCOME, HUNTER

>> Comprehensive collection of resources referencing the MITRE ATT&CK framework, curated to aid threat hunters in their investigations.

DATABASE ONLINE
MITRE ATT&CK LOADED
ACCESS GRANTED

>> MITRE ATT&CK TACTICS

RECONNAISSANCE
Gather information about targets before launching attacks.
ACCESS >>
INITIAL ACCESS
Gain initial foothold through phishing, exploits, and supply chain.
ACCESS >>
PERSISTENCE
Maintain foothold across restarts and credential changes.
ACCESS >>
PRIVILEGE ESCALATION
Gain higher-level permissions through exploitation and abuse.
ACCESS >>
DEFENSE EVASION
Avoid detection by disabling tools and obfuscating activity.
ACCESS >>
CREDENTIAL ACCESS
Steal credentials, passwords, and tokens for resource access.
ACCESS >>
DISCOVERY
Gain knowledge about internal systems and network topology.
ACCESS >>
LATERAL MOVEMENT
Enter and control remote systems across the network.
ACCESS >>
COLLECTION
Gather information from local systems and network shares.
ACCESS >>
COMMAND AND CONTROL
Communicate with compromised systems via encrypted channels.
ACCESS >>
EXFILTRATION
Steal data from networks over alternative protocols.
ACCESS >>
IMPACT
Disrupt availability through ransomware and DoS attacks.
ACCESS >>

>> ADDITIONAL RESOURCES

WINDOWS EVENT IDS
Critical Windows Security Event IDs for logon types and process creation.
ACCESS >>
DETECTION QUERIES
Pre-built queries for Splunk, ELK, Sentinel, and other SIEM platforms.
ACCESS >>
TOOL REPOSITORY
Scripts and utilities for log analysis and forensic investigation.
ACCESS >>
LEARNING PATHS
Labs, challenges, and scenarios to build threat hunting skills.
ACCESS >>