ATT&CK Mate
Ask me anything about the ATT&CK
Some example prompts:
What are the latest Initial Access techniques?
What threat actors modify GPOs to execute code?
What are the top 5 data sources for ICS techniques?
Create a bar chart of top 10 techniques vs # of groups
Click below to use this gipety: