‰ÛÏDo I feel lucky?‰Û. Well, do ya, punk?
- **101** * [Mythic](https://github.com/its-a-feature/Mythic) * A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming. * [A Change of Mythic Proportions - Cody Thomas(2020)](https://posts.specterops.io/a-change-of-mythic-proportions-21debeb03617) * [Mythic Feature Examples - Cody Thomas(2020)](https://www.youtube.com/playlist?list=PLHVFedjbv6sNLB1QqnGJxRBMukPRGYa-H) * [Launching Apfell Programmatically - Cedric Owens(2019)](https://medium.com/red-teaming-with-a-blue-team-mentality/launching-apfell-programmatically-c90fe54cad89) - **Articles/Blogposts/Writeups** * [In-memory Python Modules with the Medusa Mythic Agent - Alfie Champion(2021)](https://ajpc500.github.io/c2/In-memory-Python-Modules-With-The-Medusa-Mythic-Agent/) * [Let’s Talk DNS: Designing a DNS Profile for Mythic C2 - Thiago Mayllart(2021)](https://www.hakaioffensivesecurity.com/lets-talk-dns-designing-a-dns-profile-for-mythic-c2/) * [Multi-Stage Offensive Operations with Mythic - Kyle Avery(2021)](https://blog.kyleavery.com/posts/multi-stage-mythic/) * [Code](https://github.com/kyleavery/Multi-Stage-Mythic) - **Talks/Presentations/Videos** * [From Zero to Hero: How to Create a Custom Mythic Agent - Cody Thomas and Josiah Massari](https://www.youtube.com/watch?v=xdmdHMjK1KA&list=PLJK0fZNGiFU-2vFpjnt96j_VSuQVTkAnO&index=18) * Learn how to create your own Mythic agent from scratch. In this two-hour workshop, we will create a new PowerShell agent that dynamically loads new commands, hooks into a few of Mythic's features, and provides an avenue to load 3rd party tooling. Come prepped with Mythic installed and you will leave with the code for your new Hercules agent. * [Sharpening Our Arrows: Training with Apollo – Dwight Hohnstein (SO-CON 2020)](https://www.youtube.com/watch?v=bcRgj1X7WsA&list=PLJK0fZNGiFU-2vFpjnt96j_VSuQVTkAnO&index=12) * Apollo is the latest Windows-platform integration into the Mythic command-and-control framework. Apollo is open source, written in C#, and designed with training in mind to help students who take our course offerings better understand how different attack techniques are implemented at a technical level. Learn how to use an extensible and feature-rich Windows agent that leverages the rich functionality of Mythic in this hour-long debrief. - **Agents** * [Github Repo of 'Official' Agents](https://github.com/MythicAgents) * [Apollo](https://github.com/MythicAgents/Apollo) * [Atlas](https://github.com/MythicAgents/atlas) * [Hermes](https://github.com/MythicAgents/hermes) * [Medusa](https://github.com/MythicAgents/Medusa) * [Merlin](https://github.com/MythicAgents/merlin) * [Venus](https://github.com/MythicAgents/venus) - **Payload Wrappers** * [ScareCrow Wrapper](https://github.com/kyleavery/scarecrow_wrapper)
transform-x86blocks for post-ex and stage libraries.
~1 hour. This includes everything from your Teamserver (CobaltStrike), redirectors to Phishing Servers with full DKIM, DMARC, SPF, etc.
*BSDand PE on Windows). The rationale for these libraries is the following: You wrote an exploit and achieved arbitrary code execution. Now what? These loaders enable you to load and execute an arbitrary binary in your exploited process. The loaders are coded in a way that it's all done in memory, and they do not require access to system libraries/methods - it's all resolved on the fly. The Macho loader enables you to run bundle files, the ELF loader standard ELF files (no shared objects), and the PE loader enables you to run both DLLs and PE files alike.
Call()implementation that lets you call into exported symbols from those libraries without stress.
Faxes, Printers, Other