Designed to document and present in an easily searchable and filter-capable manner commands often associated with malicious activity.
- Commandline
- Description
- Cyber Killchain Phases
- MITRE Tactics and Techniques
- Applicable OS[s]
- Reference[s]
- Risk [Low, Medium, High, Critical]
- Risk Reason
- Fidelity [Low, Medium, High]
- Fidelity Reason
- Threat Actors with Associated References
- Tool Name
- Tool Description
- Common Arguments
- Tool URL
- Tool Operating Systems
- ? - Threat Actor References
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions on Objectives
- Lots...