Mythic
GHunt
Mythic | GHunt | |
---|---|---|
5 | 20 | |
2,898 | 15,018 | |
- | - | |
9.6 | 7.2 | |
7 days ago | 9 days ago | |
JavaScript | Python | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Mythic
-
Install Mythic C2 server - Intro to C2 Infra for Red Teams
Learn the basic installation of Mythic Command and Control (C2) step by step. We'll configure Mythic C2 (open-source C2 framework https://github.com/its-a-feature/Mythic)
-
Mythic C2 Detections
title: Detect Mythic Agent Traffic Over Port 8443 status: experimental author: Rotten_Sec description: Detects traffic over port 8443 that matches the WebSocket handshake used by Mythic agents to communicate with the C2 server. references: - https://github.com/its-a-feature/Mythic tags: - attack.t1071.001 - attack.t1071.004 - attack.t1071.005 - attack.t1071.006 logsource: category: network keywords: [tcp, port, 8443] condition: tcp.port == 8443 and ( "GET /websocket HTTP/1.1\r\n" in to_string($data) or "HTTP/1.1 101 Switching Protocols\r\nUpgrade: websocket\r\nConnection: Upgrade\r\n" in to_string($data) )
-
Building a Red Team - Which C2 to pick?
In my opinion, Mythic is a great choice because it is free, extremely well developed, and provides a base capability that allows you to either extend it or to leverage the work of others. With Mythic, there are currently 16 public MythicAgents and 6 different MythicC2Profiles. You can use the public agents/C2profile and then switch to internal private versions if your team decides to go that way without the need to re-learn an entire framework. It has a web front end that provides a lot of (extendable) functionality I don't see in other tools. Additionally the lead developer is always extremely eager to provide help, add features, and fix bugs. Full disclosure: I'm the primary developer of Merlin.
- Some information and advice about DDoS, from someone who was there during #opPayback
- List of resources
GHunt
- GHunt – Offensive Google Framework
-
Launching Osint Industries: Discover Your Digital Footprint in Realtime
Greetings, HN community. We are excited to share OSINT Industries, a platform dedicated to real-time open-source intelligence (OSINT) pertaining to phone numbers and emails.
About OSINT Industries:
Realtime Analysis: We provide an up-to-the-moment enrichment tool for emails, and phone numbers.
Real-Time Intelligence: We refrain from using databases. Every piece of data is fetched in real-time, ensuring its accuracy and timeliness. None of the queries or results are stored.
Extensive Reach: Our tool can identify associated accounts linked to a particular email or phone number from over 200 websites.
Detailed Insights: Beyond basic association, our system can pull additional data points, such as images, map locations, and more.
Pedigree: Our foundation is built upon proven tools our team made in the past like Holehe (https://github.com/megadose/holehe), GHunt (https://github.com/mxrch/GHunt), and onionsearch (https://github.com/megadose/OnionSearch).
User Base: Within 3 months of our inception, we've got over 350k registered users.
Trust & Reliability: Our tool has been integrated by various global law enforcement agencies, showcasing its reliability and utility.
Try the tool for free to discover the digital footprint of your email and phone number. The first 5 searches are free: https://osint.industries
We offer API access to enterprises, if you're interested in that contact me on [email protected].
As our tool deals with data that some may view as sensitive, I think it is also important to link our policies here which govern our ethics, and data processing.
Trust & Safety (our ethics): https://osint.industries/trust
- Someone found my real name
-
IWTL how to find and delete old online accounts that I've forgotten about
GHunt
- Whats the best OSINT tool u know of that not many other people know of?
- Gmail less secure access. Powershell sent email.
- recon365 - Gather information from an email address connected to Office 365
- How to get an email from a google review?
- No. 2 is probably alive.
-
OSINT Tool to find someone's social media accounts using email address.
1 of all is not possible I think but you couls combine toutatis and GHunt, and maybe others
What are some alternatives?
sliver - Adversary Emulation Framework
Profil3r - OSINT tool that allows you to find a person's accounts and emails + breached emails 🕵️
CamPhish - Grab cam shots from target's phone front camera or PC webcam just sending a link.
sherlock - 🔎 Hunt down social media accounts by username across social networks
ScareCrow - ScareCrow - Payload creation framework designed around EDR bypass.
maskphish - Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
PoC-in-GitHub - 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
awesome-bbht - A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
urh - Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
maigret - 🕵️♂️ Collect a dossier on a person by username from thousands of sites