Mythic
EvilOSX
Mythic | EvilOSX | |
---|---|---|
5 | 5 | |
2,898 | 2,171 | |
- | - | |
9.6 | 0.0 | |
7 days ago | about 3 years ago | |
JavaScript | Python | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Mythic
-
Install Mythic C2 server - Intro to C2 Infra for Red Teams
Learn the basic installation of Mythic Command and Control (C2) step by step. We'll configure Mythic C2 (open-source C2 framework https://github.com/its-a-feature/Mythic)
-
Mythic C2 Detections
title: Detect Mythic Agent Traffic Over Port 8443 status: experimental author: Rotten_Sec description: Detects traffic over port 8443 that matches the WebSocket handshake used by Mythic agents to communicate with the C2 server. references: - https://github.com/its-a-feature/Mythic tags: - attack.t1071.001 - attack.t1071.004 - attack.t1071.005 - attack.t1071.006 logsource: category: network keywords: [tcp, port, 8443] condition: tcp.port == 8443 and ( "GET /websocket HTTP/1.1\r\n" in to_string($data) or "HTTP/1.1 101 Switching Protocols\r\nUpgrade: websocket\r\nConnection: Upgrade\r\n" in to_string($data) )
-
Building a Red Team - Which C2 to pick?
In my opinion, Mythic is a great choice because it is free, extremely well developed, and provides a base capability that allows you to either extend it or to leverage the work of others. With Mythic, there are currently 16 public MythicAgents and 6 different MythicC2Profiles. You can use the public agents/C2profile and then switch to internal private versions if your team decides to go that way without the need to re-learn an entire framework. It has a web front end that provides a lot of (extendable) functionality I don't see in other tools. Additionally the lead developer is always extremely eager to provide help, add features, and fix bugs. Full disclosure: I'm the primary developer of Merlin.
- Some information and advice about DDoS, from someone who was there during #opPayback
- List of resources
EvilOSX
- Best RAT tools for macos
- Some information and advice about DDoS, from someone who was there during #opPayback
- List of resources
-
mac osX rat
remote administration tool for mac:https://github.com/Marten4n6/EvilOSX
-
Awesome Penetration Testing
EvilOSX - Modular RAT that uses numerous evasion and exfiltration techniques out-of-the-box.
What are some alternatives?
sliver - Adversary Emulation Framework
Mac-Set-Default-Apps - A utility to change default applications in macOS
CamPhish - Grab cam shots from target's phone front camera or PC webcam just sending a link.
DiscordRAT - Discord Remote Administration Tool fully written in Python3
ScareCrow - ScareCrow - Payload creation framework designed around EDR bypass.
maskphish - Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
osx-patcher - Command line tool for running OS X on unsupported Macs
awesome-bbht - A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
macos-patcher - Command line tool for running macOS on unsupported Macs
urh - Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
GHunt - 🕵️♂️ Offensive Google framework.