Interactive framework of adversary tactics, techniques, and procedures
Click to explore reconnaissance techniques used by adversaries in this stage of the attack lifecycle.
Click to explore initial access techniques used by adversaries in this stage of the attack lifecycle.
Click to explore execution techniques used by adversaries in this stage of the attack lifecycle.
Click to explore persistence techniques used by adversaries in this stage of the attack lifecycle.
Click to explore privilege escalation techniques used by adversaries in this stage of the attack lifecycle.
Click to explore defense evasion techniques used by adversaries in this stage of the attack lifecycle.
Click on any technique to view detailed information, detection methods, and certification mappings.
Learn About MITRE ATT&CK