Mythic v3.2 Highlights: Interactive Tasking, Push C2, and Dynamic File Browser

Mythic v3.2 Highlights: Interactive Tasking, Push C2, and Dynamic File Browser

TL;DR;Mythic v3.2 has Push C2, Interactive Async Tasking, TypedArray parameters, new graphing libraries in the UI, database migrations, dynamic file browser groupings, and more!Image Generated by https://hotpot.ai/art-generatorMythic v3.2It’s been a few months since ...
Phishing With Dynamite

Phishing With Dynamite

Token stealing is getting harder. Instead, stealing whole logged-in browser instances may be an easier and more generic approach. One attack, known as “browser-in-the-middle” (BitM), makes it possible to virtually place a ...
Bloodhound Enterprise: securing Active Directory using graph theory

Bloodhound Enterprise: securing Active Directory using graph theory

BloodHound Enterprise: securing Active Directory using graphsPrior to my employment at SpecterOps, I hadn’t worked in the information security industry- as a result, many security related terms and concepts that were tossed around ...
Mythic 2.3 — An Interface Reborn

Mythic 2.3 — An Interface Reborn

| | mythic, red-team-tools
Mythic 2.3 — An Interface RebornNew Mythic SearchMythic started off as a proof of concept, open source project in 2018 with a small follow-on blog series for the process and the rationale of the various ...