red-team-tools
Mythic v3.2 Highlights: Interactive Tasking, Push C2, and Dynamic File Browser
TL;DR;Mythic v3.2 has Push C2, Interactive Async Tasking, TypedArray parameters, new graphing libraries in the UI, database migrations, dynamic file browser groupings, and more!Image Generated by https://hotpot.ai/art-generatorMythic v3.2It’s been a few months since ...
Phishing With Dynamite
Token stealing is getting harder. Instead, stealing whole logged-in browser instances may be an easier and more generic approach. One attack, known as “browser-in-the-middle” (BitM), makes it possible to virtually place a ...
Bloodhound Enterprise: securing Active Directory using graph theory
BloodHound Enterprise: securing Active Directory using graphsPrior to my employment at SpecterOps, I hadn’t worked in the information security industry- as a result, many security related terms and concepts that were tossed around ...
COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT
Shouty name—dangerous game. Red-team tool ripe for misuse ...
Mythic 2.3 — An Interface Reborn
Mythic 2.3 — An Interface RebornNew Mythic SearchMythic started off as a proof of concept, open source project in 2018 with a small follow-on blog series for the process and the rationale of the various ...