This website requires JavaScript.
Explore
Help
Register
Sign In
infosecn1nja
/
DeTTECT
mirror of
https://github.com/infosecn1nja/DeTTECT.git
Watch
1
Star
0
Fork
You've already forked DeTTECT
0
Code
Issues
Packages
Projects
Releases
Wiki
Activity
Removed an unnecessary space within the file path
Browse Source
master
Marcus Bakker
2020-07-16 21:57:54 +02:00
parent
54a0cf8cde
commit
27ea42f8e0
51 changed files
with
0 additions
and
0 deletions
Show all changes
Ignore whitespace when comparing lines
Ignore changes in amount of whitespace
Ignore changes in whitespace at EOL
Show Stats
Download Patch File
Download Diff File
Expand all files
Collapse all files
0
threat-actor-data/pre-sub-techniques/20190319-RedCanary.yaml → threat-actor-data/pre-sub-techniques/20190319-RedCanary.yaml
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/20190528-Rapid7.yaml → threat-actor-data/pre-sub-techniques/20190528-Rapid7.yaml
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/20190829-Kaspersky.yaml → threat-actor-data/pre-sub-techniques/20190829-Kaspersky.yaml
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/20190902-ATTACK-Techniques-and-trends-in-Windows-malware.yaml → threat-actor-data/pre-sub-techniques/20190902-ATTACK-Techniques-and-trends-in-Windows-malware.yaml
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/20191001-CrowdStrike-software.md → threat-actor-data/pre-sub-techniques/20191001-CrowdStrike-software.md
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/20191001-CrowdStrike.yaml → threat-actor-data/pre-sub-techniques/20191001-CrowdStrike.yaml
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/20191126-RedCanary-retail-sector.yaml → threat-actor-data/pre-sub-techniques/20191126-RedCanary-retail-sector.yaml
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/20200220-FireEye.yaml → threat-actor-data/pre-sub-techniques/20200220-FireEye.yaml
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/20200306-CrowdStrike.yaml → threat-actor-data/pre-sub-techniques/20200306-CrowdStrike.yaml
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/20200318-RedCanary.yaml → threat-actor-data/pre-sub-techniques/20200318-RedCanary.yaml
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/20200331-RecordedFuture.yaml → threat-actor-data/pre-sub-techniques/20200331-RecordedFuture.yaml
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/20200520-ACSC.yaml → threat-actor-data/pre-sub-techniques/20200520-ACSC.yaml
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - communication.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - communication.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - education.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - education.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - energy.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - energy.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - financials.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - financials.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - government.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - government.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - health.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - health.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - hospitality.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - hospitality.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - industrial.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - industrial.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - media.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - media.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - nonprofit.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - nonprofit.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - overall.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - overall.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - pharmaceuticals.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - pharmaceuticals.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - retail.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - retail.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - services.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - services.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - technology.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - technology.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - transportation.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - transportation.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190528-Rapid7/Rapid7 Quarterly Threat Report Q1 2019-enterprise.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190528-Rapid7/Rapid7 Quarterly Threat Report Q1 2019-enterprise.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190528-Rapid7/Rapid7 Quarterly Threat Report Q1 2019-mobile.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190528-Rapid7/Rapid7 Quarterly Threat Report Q1 2019-mobile.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190829-Kaspersky/Kaspersky Incident Response report 2018.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190829-Kaspersky/Kaspersky Incident Response report 2018.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190902-ATTACK-Techniques-and-trends-in-Windows-malware/ATTACK-Techniques-and-Trends-in-Windows-malware.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190902-ATTACK-Techniques-and-trends-in-Windows-malware/ATTACK-Techniques-and-Trends-in-Windows-malware.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(heat-map-first-half-of-2019).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(heat-map-first-half-of-2019).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(seen-in-2018).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(seen-in-2018).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(seen-in-2018-and-first-half-of-2019).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(seen-in-2018-and-first-half-of-2019).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(seen-in-first-half-of-2019).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(seen-in-first-half-of-2019).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191126-RedCanary/attack_windows_top-10-techniques-red-canary-detected-against-the-retail-sector-in-2019.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191126-RedCanary/attack_windows_top-10-techniques-red-canary-detected-against-the-retail-sector-in-2019.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200220-FireEye/attack_all_fireeye-m-trends-2020.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200220-FireEye/attack_all_fireeye-m-trends-2020.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200306-CrowdStrike/attack_windows-linux-macos_crowdstrike-global-threat-report-2020.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200306-CrowdStrike/attack_windows-linux-macos_crowdstrike-global-threat-report-2020.json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(education).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(education).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(energy).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(energy).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(finance).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(finance).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(healthcare).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(healthcare).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(manufacturing).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(manufacturing).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(overall).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(overall).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(retail).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(retail).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(services).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(services).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(technology).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(technology).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(transportation).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(transportation).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200331-RecordedFuture/attack_windows-linux-macos_recorded-future-ttp-annual-report-2019-(top-10).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200331-RecordedFuture/attack_windows-linux-macos_recorded-future-ttp-annual-report-2019-(top-10).json
Unescape
Escape
View File
0
threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200520-ACSC/attack_all_summary-of-tradecraft-trends-for-2019-2020-ttps-used-to-target-australian-networks.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200520-ACSC/attack_all_summary-of-tradecraft-trends-for-2019-2020-ttps-used-to-target-australian-networks.json
Unescape
Escape
View File
Write
Preview
Loading…
Cancel
Save
Reference in New Issue
Repository
infosecn1nja/DeTTECT
Title
Body
Create Issue