mitre-attack
Installation
SKILL.md
MITRE ATT&CK Enterprise Tactics (TA)
| Tactic ID | Tactic Name | Description |
|---|---|---|
| TA0001 | Initial Access | Entry point into target environment |
| TA0002 | Execution | Running malicious code |
| TA0003 | Persistence | Maintaining foothold across reboots |
| TA0004 | Privilege Escalation | Gaining higher-level permissions |
| TA0005 | Defense Evasion | Avoiding detection |
| TA0006 | Credential Access | Stealing credentials |
| TA0007 | Discovery | Learning about the environment |
| TA0008 | Lateral Movement | Moving through the network |
| TA0009 | Collection | Gathering data of interest |
| TA0010 | Exfiltration | Stealing data |
| TA0011 | Command and Control | Communicating with compromised systems |
| TA0040 | Impact | Disrupting availability or integrity |
Top 50 ATT&CK Techniques
Related skills
More from mukul975/threatswarm
exploit-db
Exploit-DB and searchsploit reference — EDB→Metasploit module mappings, PoC reliability rubric, CVSS tier quick reference, and searchsploit usage patterns
1ad-attacks
Active Directory attack reference — BloodHound Cypher queries, Kerberos attack decision tree, ACE/ACL abuse, ADCS ESC1-8, and AD misconfig checklist
1report-templates
CVSS 3.1 vector examples, executive summary template, full technical finding template, and remediation language bank for pentest reports
1wordlists
SecLists path map, hashcat rules, CeWL usage, and custom wordlist generation for all attack categories
1