/ Templates / Techniques.md
Techniques.md
 1  **1. Description:**
 2  
 3  **2. How it Works:**
 4  
 5  **3. Use Cases in Cybersecurity:**
 6  - **Offensive Security:**
 7  - **Defensive Security:**
 8  
 9  **4. Advantages and Disadvantages:**
10  - **Advantage:**
11  - **Disadvantage:**
12  
13  **5. Countermeasures:**
14  - 
15  
16  **6. Examples:**
17  -