Ĭhimera has obtained and used tools such as BloodHound, Cobalt Strike, Mimikatz, and PsExec. Ĭarbanak has obtained and used open-source tools such as PsExec and Mimikatz. īRONZE BUTLER has obtained and used open-source tools such as Mimikatz, gsecdump, and Windows Credential Editor. īlue Mockingbird has obtained and used tools such as Mimikatz. īlackTech has obtained and used tools such as Putty, SNScan, and PsExec for its operations. īackdoorDiplomacy has obtained a variety of open-source reconnaissance and red team tools for discovery and lateral movement. Īquatic Panda has acquired and used Cobalt Strike in its operations. ĪPT41 has obtained and used tools such as Mimikatz, pwdump, PowerSploit, and Windows Credential Editor. ĪPT39 has modified and used customized versions of publicly-available tools like PLINK and Mimikatz. ĪPT38 has obtained and used open-source tools such as Mimikatz. ĪPT33 has obtained and leveraged publicly-available tools for early intrusion activities. ĪPT32 has obtained and used tools such as Mimikatz and Cobalt Strike, and a variety of other open-source tools from GitHub. ĪPT29 has obtained and used a variety of tools including Mimikatz, SDelete, Tor, meek, and Cobalt Strike. ĪPT28 has obtained and used open-source tools like Koadic, Mimikatz, and Responder. ĪPT19 has obtained and used publicly-available tools like Empire. ĪPT1 has used various open-source tools for privilege escalation purposes. APT-C-36 obtained and used a modified variant of Imminent Monitor.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |