Mohana Shankar D 39c0efe2d5 Update T1113.yaml (#2827)
Detects the enabling of the Windows Recall feature via registry manipulation. Windows Recall can be enabled by deleting the existing "DisableAIDataAnalysis" registry value. Adversaries may enable Windows Recall as part of post-exploitation discovery and collection activities. This rule assumes that Recall is already explicitly disabled on the host, and subsequently enabled by the adversary.

Co-authored-by: Hare Sudhan <code@0x6c.dev>
Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2024-07-10 10:05:09 -05:00
2024-07-10 10:05:09 -05:00
2022-08-03 09:18:01 -06:00
2018-06-13 19:33:59 -06:00

Atomic Red Team

GitHub Action Status Atomics GitHub Action Status

Atomic Red Team™ is a library of tests mapped to the MITRE ATT&CK® framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments.

Get started

You can execute atomic tests directly from the command line, no installation required. See the Getting started page of our wiki.

For a more robust testing experience, consider using an execution framework like Invoke-Atomic.

Learn more

The Atomic Red Team documentation is available as a wiki.

For information about the philosophy and development of Atomic Red Team, visit our website at https://atomicredteam.io.

Contribute to Atomic Red Team

Atomic Red Team is open source and community developed. If you're interested in becoming a contributor, check out these resources:

  • Join our Slack workspace and get involved with the community. Don't forget to review the code of conduct before you join.
  • Report bugs and request new features by submitting an issue.
  • Read our contribution guide for more information about contributing directly to this repository.
  • Check the license for information regarding the distribution and modification of Atomic Red Team.
  • Contribute to linux atomics quickly from GitHub Codespaces. For more details, click here

Open in GitHub Codespaces

S
Description
Atomic Red Team test automation and mapping
Readme 563 MiB
Languages
C 38.7%
PowerShell 13.3%
Go 11.4%
Java 7.8%
C# 6.8%
Other 21.7%