MITRE ATT&CK pivot
Browse documented Windows syscalls grouped by the ATT&CK technique they implement. Useful for threat hunters mapping detections back to the underlying kernel calls.
61 techniques referenced across the syscall catalog
Browse documented Windows syscalls grouped by the ATT&CK technique they implement. Useful for threat hunters mapping detections back to the underlying kernel calls.
61 techniques referenced across the syscall catalog