APT Modules

ATTACKIFY has a large library of individualized attack modules based off the TACTICS, TECHNIQUES and PROCEDURES seen in APT threat actors. You can refine detection and improve monitoring abilities by continuosly running modules over and over.

Some of these modules include tactics, techniques and procedures of the following:

- Pass the Hash
- Alternate Data Stream Files
- COM+ Services LSASS Memory Dump
- Screen Capture
- BITS Jobs Code Persistence
- RDP Session Hijacking
- Sticky Keys Privileged Persistence
- Copy Clipboard Data
- Process Hollowing

Contact Us

Interested to find out more about ATTACKIFY?