center-for-threat-informed-defense/top-attack-techniques
Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques to focus on first.
VueApache-2.0
Stargazers
- 0A7V9A0a7v9a
- 0xFh
- 91tim
- ahmedabdulazim
- ahmedandaloesAnDaLoeS
- airborne1Milan
- andresrt
- bigdaddycyber
- br3ach3r-fff
- evram94
- Feynman43
- For3stCo1d
- hackbug38
- hamdynady
- IanDavila@tidalcyber
- IderAghbal
- jescoredo
- jocelynkhuuNew York, NY
- jonathanbaker@mitre @mitre-attack
- kfb1007
- mattreduce@hashicorp and @srcmtd
- MohamedEl-LithyCairo, Egypt
- mozayed007Giza, Egypt.
- mustafaelsolia
- nanaao
- Prola3
- quantum-decrypt-security
- RE-EXPOC
- sgcm14
- shoveleejoe
- Storm0
- SuperDolby
- TarikIbrahimEgypt
- Tun-leadsIntercepthub
- xElkomyCO-Founder of @Cyber-Ar
- zAbuQasem