A comprehensive mapping of the Cyber Kill Chain and MITRE ATT&CK frameworks to various tools and techniques commonly used in malware analysis, reverse engineering, and software exploitation analysis.
reverse-engineering
malware-analysis
offensive-security
mitre-attack
defensive-security
cyber-operations
cyber-kill-chain
software-exploitation-analysis
-
Updated
Sep 4, 2024 - Jupyter Notebook