Directories ¶ Show internal Expand all Path Synopsis cmd stratus internal attacktechniques attacktechniques/aws/credential-access/ec2-get-password-data attacktechniques/aws/credential-access/ec2-steal-instance-credentials attacktechniques/aws/credential-access/secretsmanager-batch-retrieve-secrets attacktechniques/aws/credential-access/secretsmanager-retrieve-secrets attacktechniques/aws/credential-access/ssm-retrieve-securestring-parameters attacktechniques/aws/defense-evasion/cloudtrail-delete attacktechniques/aws/defense-evasion/cloudtrail-event-selectors attacktechniques/aws/defense-evasion/cloudtrail-lifecycle-rule attacktechniques/aws/defense-evasion/cloudtrail-stop attacktechniques/aws/defense-evasion/dns-delete-logs attacktechniques/aws/defense-evasion/organizations-leave attacktechniques/aws/defense-evasion/vpc-remove-flow-logs attacktechniques/aws/discovery/ec2-enumerate-from-instance attacktechniques/aws/discovery/ec2-get-user-data attacktechniques/aws/discovery/ses-enumerate attacktechniques/aws/execution/ec2-launch-unusual-instances attacktechniques/aws/execution/ec2-user-data attacktechniques/aws/execution/ssm-send-command attacktechniques/aws/execution/ssm-start-session attacktechniques/aws/exfiltration/ec2-security-group-open-port-22-ingress attacktechniques/aws/exfiltration/ec2-share-ami attacktechniques/aws/exfiltration/ec2-share-ebs-snapshot attacktechniques/aws/exfiltration/rds-share-snapshot attacktechniques/aws/exfiltration/s3-backdoor-bucket-policy attacktechniques/aws/impact/bedrock-invoke-model attacktechniques/aws/impact/s3-ransomware-batch-deletion attacktechniques/aws/impact/s3-ransomware-client-side-encryption attacktechniques/aws/impact/s3-ransomware-individual-deletion attacktechniques/aws/initial-access/console-login-without-mfa attacktechniques/aws/lateral-movement/ec2-send-serial-console-send-ssh-public-key attacktechniques/aws/lateral-movement/ec2-send-ssh-public-key attacktechniques/aws/persistence/iam-backdoor-role attacktechniques/aws/persistence/iam-backdoor-user attacktechniques/aws/persistence/iam-create-admin-user attacktechniques/aws/persistence/iam-create-backdoor-role attacktechniques/aws/persistence/iam-create-user-login-profile attacktechniques/aws/persistence/lambda-backdoor-function attacktechniques/aws/persistence/lambda-layer-extension attacktechniques/aws/persistence/lambda-overwrite-code attacktechniques/aws/persistence/rolesanywhere-create-trust-anchor attacktechniques/aws/persistence/sts-federation-token attacktechniques/aws/privilege-escalation/change-iam-user-password attacktechniques/azure/execution/vm-custom-script-extension attacktechniques/azure/execution/vm-run-command attacktechniques/azure/exfiltration/disk-export attacktechniques/azure/persistence/create-bastion-shareable-link attacktechniques/eks/lateral-movement/create-access-entry attacktechniques/eks/persistence/backdoor-aws-auth-configmap attacktechniques/entra-id/persistence/backdoor-application attacktechniques/entra-id/persistence/backdoor-application-sp attacktechniques/entra-id/persistence/guest-user attacktechniques/entra-id/persistence/hidden-au attacktechniques/entra-id/persistence/new-application attacktechniques/entra-id/persistence/restricted-au attacktechniques/gcp/exfiltration/share-compute-disk attacktechniques/gcp/exfiltration/share-compute-image attacktechniques/gcp/exfiltration/share-compute-snapshot attacktechniques/gcp/persistence/backdoor-service-account-policy attacktechniques/gcp/persistence/create-admin-service-account attacktechniques/gcp/persistence/create-service-account-key attacktechniques/gcp/persistence/invite-external-user attacktechniques/gcp/privilege-escalation/impersonate-service-accounts attacktechniques/k8s/credential-access/dump-secrets attacktechniques/k8s/credential-access/steal-serviceaccount-token attacktechniques/k8s/persistence/create-admin-clusterrole attacktechniques/k8s/persistence/create-client-certificate attacktechniques/k8s/persistence/create-token attacktechniques/k8s/privilege-escalation/hostpath-volume attacktechniques/k8s/privilege-escalation/nodes-proxy attacktechniques/k8s/privilege-escalation/privileged-pod providers state state/mocks utils utils/gcp pkg stratus stratus/loader stratus/mitreattack stratus/runner stratus/runner/mocks stratus/useragent tools Click to show internal directories. Click to hide internal directories.