CYBER MONGOL
  • ASATA
  • Our Journey
  • Intelligence Engine
  • Human-Machine Teaming
  • Operator Research
  • Achievements and Media
  • Counter Intelligence
  • ASATA
  • Our Journey
  • Intelligence Engine
  • Human-Machine Teaming
  • Operator Research
  • Achievements and Media
  • Counter Intelligence
Search by typing & pressing enter

YOUR CART

ASATA
Advanced Skills & Adversary Tactics Articulation
​Search across 1 million Windows functions used in today’s most popular offensive tradecraft. Operators can filter their search criteria by Windows functions, function parameters and MITRE defined behavior types. ASATA observes real-time trends in the cybersecurity ecosystem so as to continually grow the offensive codebase made available to search. ​
Picture
​Get a rapid understanding of how adversaries build their tactics by seeing a visual layout of the codebase. Further tactic comprehension is bolstered by being able to select MITRE defined behavior types and having the corresponding source code visualized. Interface users are able to click on called functions and their parameters to get the related MSDN documentation and jump directly into the source code to where those functions and parameters are used. 

ASATA is built atop advanced cyber intelligence automation that continually monitors the cyber security ecosystem. Human activities within that ecosystem are measured and mapped, allowing ASATA to alert its users to new and emerging trends in exploitation.

Picture
contact us:
© COPYRIGHT 2015. ALL RIGHTS RESERVED.