Query and retrieve information about various adversarial tactics and techniques used in cyber attacks. Access a comprehensive knowledge base to enhance your understanding of security risks and adversary behaviors. Utilize the provided tools to efficiently explore ATT&CK techniques and tactics.