Mythic
CamPhish
Mythic | CamPhish | |
---|---|---|
5 | 5 | |
2,898 | 2,834 | |
- | - | |
9.6 | 5.1 | |
7 days ago | 6 days ago | |
JavaScript | HTML | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Mythic
-
Install Mythic C2 server - Intro to C2 Infra for Red Teams
Learn the basic installation of Mythic Command and Control (C2) step by step. We'll configure Mythic C2 (open-source C2 framework https://github.com/its-a-feature/Mythic)
-
Mythic C2 Detections
title: Detect Mythic Agent Traffic Over Port 8443 status: experimental author: Rotten_Sec description: Detects traffic over port 8443 that matches the WebSocket handshake used by Mythic agents to communicate with the C2 server. references: - https://github.com/its-a-feature/Mythic tags: - attack.t1071.001 - attack.t1071.004 - attack.t1071.005 - attack.t1071.006 logsource: category: network keywords: [tcp, port, 8443] condition: tcp.port == 8443 and ( "GET /websocket HTTP/1.1\r\n" in to_string($data) or "HTTP/1.1 101 Switching Protocols\r\nUpgrade: websocket\r\nConnection: Upgrade\r\n" in to_string($data) )
-
Building a Red Team - Which C2 to pick?
In my opinion, Mythic is a great choice because it is free, extremely well developed, and provides a base capability that allows you to either extend it or to leverage the work of others. With Mythic, there are currently 16 public MythicAgents and 6 different MythicC2Profiles. You can use the public agents/C2profile and then switch to internal private versions if your team decides to go that way without the need to re-learn an entire framework. It has a web front end that provides a lot of (extendable) functionality I don't see in other tools. Additionally the lead developer is always extremely eager to provide help, add features, and fix bugs. Full disclosure: I'm the primary developer of Merlin.
- Some information and advice about DDoS, from someone who was there during #opPayback
- List of resources
CamPhish
- Quel réponse approprié pour un brouteur au colis?
- kalilinux vm camphish direct link not showing up where it should be.heres a discussion i found that shows the same problem as me.the comments didnt help.What do i do?
- Some information and advice about DDoS, from someone who was there during #opPayback
- List of resources
-
What’s the best tool for hacking WebCams
ok. I really dont want to get banned or something but here is a github tool that can be used to phish someone with a link and get control over the camera. https://github.com/techchipnet/CamPhish (This only works if the target is stupid lol). If you want to hack a webcam without phishing you need more knowledge in hacking in general. You probably need to hack the whole PC or mobile phone: --> get IP --> nmap --> search for vulnerable versions --> search the right exploit --> use it --> tap tap your in. If there is not an vulnerable version then good luck finding a 0-day lol
What are some alternatives?
sliver - Adversary Emulation Framework
GHunt - 🕵️♂️ Offensive Google framework.
ScareCrow - ScareCrow - Payload creation framework designed around EDR bypass.
gophish - Open-Source Phishing Toolkit
maskphish - Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
social-analyzer - API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites
awesome-bbht - A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Ghost - Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
urh - Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
Osintgram - Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
LinkedInt - LinkedIn Recon Tool