- AR5
- -AF022
Virtualization - AR5
Contributor: The ITM Team @ - Section AF022
- AR1
- -MT023
Revenge - AR1
Contributor: The ITM Team @ - Section MT023
- AR1
- -MT024
Recognition - AR1
Contributor: The ITM Team @ - Section MT024
- AR3
- -PR028
On-Screen Data Collection - AR3
Contributor: The ITM Team @ - Section PR028
- AR4
- -IF024
Exfiltration via Screen Sharing - AR4
Contributor: The ITM Team @ - Section IF024
- AR2
- -ME003
- -ME003.001
Virtual Machines - AR2
Contributor: The ITM Team @ - Subsection ME003.001
- AR2
- -ME003
- -ME003.002
VPN Applications - AR2
Contributor: The ITM Team @ - Subsection ME003.002
- AR2
- -ME003
- -ME003.003
Browsers - AR2
Contributor: The ITM Team @ - Subsection ME003.003
- AR2
- -ME003
- -ME003.004
Browser Extensions - AR2
Contributor: The ITM Team @ - Subsection ME003.004
- AR2
- -ME003
- -ME003.005
Cloud Storage Applications - AR2
Contributor: The ITM Team @ - Subsection ME003.005