🎯 MITRE ATT&CK Techniques

Comprehensive mapping of ATT&CK techniques to Windows processes

Loading MITRE ATT&CK Data...

🔍

🎯 ATT&CK Techniques

🎯 MITRE ATT&CK Framework

This page shows all MITRE ATT&CK techniques that are associated with Windows processes in our database. Click on any technique to see detailed information and the processes that can be abused for this technique.

The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.

🔍 How to Use This Page:

  • Browse by Tactic: Use the tactic filter to focus on specific attack phases
  • Search Techniques: Find specific techniques by ID, name, or associated processes
  • Click Techniques: View detailed information and associated processes
  • Process Links: Click on process names to go to the main process tree

📊 Statistics

0
Total Techniques
0
Associated Processes
0
Tactics Covered