Files
atomic-red-team/atomic_red_team/test_data/string_pattern_mismatch.yaml
Hare Sudhan 82fc8d41cc Add tests for python code (#2759)
* add tests for python code

* ruff format
2024-04-27 12:38:14 -05:00

14 lines
321 B
YAML

attack_technique: W1003
display_name: OS Credential Dumping
atomic_tests:
- name: Gsecdump
auto_generated_guid: 0f7c5301-6859-45ba-8b4d-1fac30fc31ed
description: |
Dump credentials from memory using Gsecdump.
supported_platforms:
- windows
executor:
command: |
echo "ART"
name: command_prompt