Intel-driven
Opsec
Preparation
Weaponisation
Password attacks
Phishing
Enumeration
Escalation
Persistence
Lateral movement and pivoting
Data exfiltration
A map tracking the use of libraries with offensive capabilities by threat actors.
OST Map