Statements (32)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:technology
|
gptkbp:enables |
gptkb:Sabotage
Surveillance Espionage Data theft Disruption |
https://www.w3.org/2000/01/rdf-schema#label |
Cyberwarfare Tools
|
gptkbp:includes |
malware
Remote Access Trojans Spyware Rootkits Vulnerability scanners Command and control servers Zero-day exploits Botnets Denial-of-service tools Keyloggers Network sniffers Password crackers Phishing kits |
gptkbp:target |
gptkb:Private_sector
Individuals Critical infrastructure Government networks |
gptkbp:usedBy |
gptkb:Hacktivists
Military organizations Cybercriminals Intelligence agencies Nation-states |
gptkbp:usedFor |
gptkb:Cyberwarfare
|
gptkbp:bfsParent |
gptkb:aircraft
|
gptkbp:bfsLayer |
4
|