awesome-bbht
Mythic
awesome-bbht | Mythic | |
---|---|---|
2 | 5 | |
545 | 2,890 | |
- | - | |
4.1 | 9.6 | |
over 2 years ago | 12 days ago | |
Shell | JavaScript | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-bbht
Mythic
-
Install Mythic C2 server - Intro to C2 Infra for Red Teams
Learn the basic installation of Mythic Command and Control (C2) step by step. We'll configure Mythic C2 (open-source C2 framework https://github.com/its-a-feature/Mythic)
-
Mythic C2 Detections
title: Detect Mythic Agent Traffic Over Port 8443 status: experimental author: Rotten_Sec description: Detects traffic over port 8443 that matches the WebSocket handshake used by Mythic agents to communicate with the C2 server. references: - https://github.com/its-a-feature/Mythic tags: - attack.t1071.001 - attack.t1071.004 - attack.t1071.005 - attack.t1071.006 logsource: category: network keywords: [tcp, port, 8443] condition: tcp.port == 8443 and ( "GET /websocket HTTP/1.1\r\n" in to_string($data) or "HTTP/1.1 101 Switching Protocols\r\nUpgrade: websocket\r\nConnection: Upgrade\r\n" in to_string($data) )
-
Building a Red Team - Which C2 to pick?
In my opinion, Mythic is a great choice because it is free, extremely well developed, and provides a base capability that allows you to either extend it or to leverage the work of others. With Mythic, there are currently 16 public MythicAgents and 6 different MythicC2Profiles. You can use the public agents/C2profile and then switch to internal private versions if your team decides to go that way without the need to re-learn an entire framework. It has a web front end that provides a lot of (extendable) functionality I don't see in other tools. Additionally the lead developer is always extremely eager to provide help, add features, and fix bugs. Full disclosure: I'm the primary developer of Merlin.
- Some information and advice about DDoS, from someone who was there during #opPayback
- List of resources
What are some alternatives?
CamPhish - Grab cam shots from target's phone front camera or PC webcam just sending a link.
sliver - Adversary Emulation Framework
Beginner-Bug-Bounty-Automation - Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull requests are welcome!)
Reconky-Automated_Bash_Script - Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
ScareCrow - ScareCrow - Payload creation framework designed around EDR bypass.
LinkedInt - LinkedIn Recon Tool
maskphish - Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
GHunt - 🕵️♂️ Offensive Google framework.
urh - Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
Cameradar - Cameradar hacks its way into RTSP videosurveillance cameras