1. Reconnaissance
2. Resource Development
3. Initial Access
4. Execution
5. Persistence
6. Privilege Escalation
7. Defense Evasion
8. Credential Access
9. Discovery
10. Lateral Movement
11. Collection
12. Command and Control
13. Exfiltration
14. Impact
Tools
Cybersecurity tools - Testing
The C2 Matrix
Red Team Infrastructure
Remote access tools
Remote execution tools
Complex function tools
Data exfiltration tools
Specialized study