Chains
TTPs
Blog
Login
Advisory
Every week, the Prelude team designs, builds and chains together TTPs. These chains, which mimic real-world cyberattacks, can be safely used to test your internal defenses. These chains are all usable in Prelude Operator.
Related Prelude themed chains
Release Date (Newest)
Filter
Search for chains, TTPs, themes, and text
Browse By:
Platforms
All
Windows
Darwin
Linux
Global
Android
Tactics & Techniques
All
Resource Development
Initial Access
Defense Evasion
Command And Control
Discovery
Collection
Persistence
Credential Access
Privilege Escalation
Lateral Movement
Execution
Exfiltration
Impact
Tags
Licenses
Are MOUSEISLAND malware procedures mitigated on this host?
2022-09-19
Emulates procedures found in MOUSEISLAND malware.
Are Agent Tesla malware procedures mitigated on this host?
2022-09-12
Emulates tactics found in Agent Tesla.
Are Remcos RAT procedures mitigated on this host?
2022-09-05
Emulates tactics found in Remcos RAT.
Are GootLoader malware procedures mitigated on this host?
2022-08-30
Emulates tactics found in GootLoader malware.
Can this host mitigate procedures used in LokiBot malware?
2022-08-23
Emulates LokiBot Password Stealer's procedures for credential harvesting.
Is this host protected from Qakbot?
2022-08-15
Emulates Qakbot's privilege escalation, defense evasion and data collection/exfiltration tactics.
1