No edit summary Tags: Reverted Visual edit |
No edit summary Tags: Reverted Visual edit |
||
Line 3: | Line 3: | ||
|+ | |+ | ||
![[File:Logo.png|left|400x400px]] | ![[File:Logo.png|left|400x400px]] | ||
! | ! | ||
*'''[[:category:Reconnaissance | Reconnaissance]]''' | *'''[[:category:Reconnaissance | Reconnaissance]]''' | ||
*'''[[:category:Resource Development | Resource Development]]''' | *'''[[:category:Resource Development | Resource Development]]''' | ||
Line 18: | Line 18: | ||
*'''[[:category:Exfiltration | Exfiltration]]''' | *'''[[:category:Exfiltration | Exfiltration]]''' | ||
*'''[[:category:Impact | Impact]]''' | *'''[[:category:Impact | Impact]]''' | ||
! | |||
! | |||
|- | |- | ||
| | | |
Revision as of 17:32, 23 February 2023
RCATs is a red team wiki/search engine built on top of the Mitre | Attack framework. Our goal is to have a centralized database of red team knowledge that the community can use and contribute to as they see fit. This is for educational purposes and cyber security professionals only. RCATs does not condone or encourage any illegal activity of any kind period.