EXPLORE
← Back to Explore
T1593.003

Code Repositories

Adversaries may search public code repositories for information about victims that can be used during targeting. Victims may store code in repositories on various third-party websites such as GitHub, GitLab, SourceForge, and BitBucket. Users typically interact with code repositories through a web application or command-line utilities such as git. Adversaries may search various public code repositories for various information about a victim. Public code repositories can often be a source of va...

PRE
2
Detections
1
Sources
3
Threat Actors

BY SOURCE

2sigma

PROCEDURES (1)

Process Creation Monitoring2 detections

Auto-extracted: 2 detections for process creation monitoring

DETECTIONS (2)