Mythic
gophish
Mythic | gophish | |
---|---|---|
5 | 59 | |
2,898 | 10,660 | |
- | 2.5% | |
9.6 | 2.8 | |
7 days ago | 24 days ago | |
JavaScript | Go | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Mythic
-
Install Mythic C2 server - Intro to C2 Infra for Red Teams
Learn the basic installation of Mythic Command and Control (C2) step by step. We'll configure Mythic C2 (open-source C2 framework https://github.com/its-a-feature/Mythic)
-
Mythic C2 Detections
title: Detect Mythic Agent Traffic Over Port 8443 status: experimental author: Rotten_Sec description: Detects traffic over port 8443 that matches the WebSocket handshake used by Mythic agents to communicate with the C2 server. references: - https://github.com/its-a-feature/Mythic tags: - attack.t1071.001 - attack.t1071.004 - attack.t1071.005 - attack.t1071.006 logsource: category: network keywords: [tcp, port, 8443] condition: tcp.port == 8443 and ( "GET /websocket HTTP/1.1\r\n" in to_string($data) or "HTTP/1.1 101 Switching Protocols\r\nUpgrade: websocket\r\nConnection: Upgrade\r\n" in to_string($data) )
-
Building a Red Team - Which C2 to pick?
In my opinion, Mythic is a great choice because it is free, extremely well developed, and provides a base capability that allows you to either extend it or to leverage the work of others. With Mythic, there are currently 16 public MythicAgents and 6 different MythicC2Profiles. You can use the public agents/C2profile and then switch to internal private versions if your team decides to go that way without the need to re-learn an entire framework. It has a web front end that provides a lot of (extendable) functionality I don't see in other tools. Additionally the lead developer is always extremely eager to provide help, add features, and fix bugs. Full disclosure: I'm the primary developer of Merlin.
- Some information and advice about DDoS, from someone who was there during #opPayback
- List of resources
gophish
-
To developers: you must not reqire a password from users
this way is very phishable because today hackers just pay Google Ads for a concrete city to catch victims (who google) and redirect them to its phishing recourse (that could be created by gophish easily)
- Any self-host FOSS suites for running phishing testing campaigns?
-
How to create an ethical Phishing campaign?
Try referring to https://getgophish.com/ which is an open source phishing tool, which can be used to run a phishing campaign
- [Sysadmin] Gophish - Open source, dans l'outil de phishing à la maison
- Phishing simulation products for MSPs
-
Phishing Infrastructure Resources?
For free, GoPhish. If you have a handsome budget, Lucy.
-
How do I set up Gophish to start automatically on Ubuntu running on EC2?
https://github.com/gophish/gophish/issues/586 Found via https://docs.getgophish.com/user-guide/installation
-
Raise Cyber awareness trough custom Phishing or spear Phishing mails
For my first phishing campaigns, i used Gophish and i had good results. It will allow you to create the email, the landing page and all the necessary stuff around it. You also have mail and page templates that you can use and customize. Personally, I prefer to push the customization so that the mails look like real mails sent internally https://github.com/gophish/gophish/
- How to install Phishing tools on my Kali Linux VM
-
What are some security measures with low employee annoyance?
Phishing with https://getgophish.com/
What are some alternatives?
sliver - Adversary Emulation Framework
King Phisher - Phishing Campaign Toolkit
CamPhish - Grab cam shots from target's phone front camera or PC webcam just sending a link.
authelia - The Single Sign-On Multi-Factor portal for web apps
ScareCrow - ScareCrow - Payload creation framework designed around EDR bypass.
maskphish - Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
Lean and Mean Docker containers - Slim(toolkit): Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
awesome-bbht - A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
pwntools - CTF framework and exploit development library
urh - Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
Osintgram - Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname