backdoorSetting Up Mythic C2: A Guide to Evading Advanced Detection SystemsDISCLAIMER: Using these tools and methods against hosts that you do not have explicit permission to test is illegal. You are responsible…Jun 3
Jashanpreet Singh👾Day 18: Command and Control (C2) in CybersecurityWelcome back to Day 18 of the 30-Day SOC Analyst Challenge! 🚀 Today’s topic dives into Command and Control (C2) — an essential part of…Sep 18
HariharanBuilding a SOC Lab with ELK Part 2: Configuring Dashboards, Detection Rules, and Alerts in…Welcome to Part 2 of the SOC Simulation Series! In the first part, I covered how to configure and set up key components like Elasticsearch…5d ago5d ago
InScritturabyJanaka StagnaroWhen the Stones AwaitTwo poems while sitting by the oceanJul 3020Jul 3020
M HaqMythic Server Setup TutorialBased on the tutorial by MyDFIR — Soc Analyst Challenge Day 20 Objective: Setup Mythic C2 ServerSep 27Sep 27
backdoorSetting Up Mythic C2: A Guide to Evading Advanced Detection SystemsDISCLAIMER: Using these tools and methods against hosts that you do not have explicit permission to test is illegal. You are responsible…Jun 3
Jashanpreet Singh👾Day 18: Command and Control (C2) in CybersecurityWelcome back to Day 18 of the 30-Day SOC Analyst Challenge! 🚀 Today’s topic dives into Command and Control (C2) — an essential part of…Sep 18
HariharanBuilding a SOC Lab with ELK Part 2: Configuring Dashboards, Detection Rules, and Alerts in…Welcome to Part 2 of the SOC Simulation Series! In the first part, I covered how to configure and set up key components like Elasticsearch…5d ago
M HaqMythic Server Setup TutorialBased on the tutorial by MyDFIR — Soc Analyst Challenge Day 20 Objective: Setup Mythic C2 ServerSep 27
InPosts By SpecterOps Team MembersbyCody ThomasMythic 3.3 Beta: Rise of the EventsA brief overview of Mythic 3.3’s new featuresJul 151
InPosts By SpecterOps Team MembersbyCody ThomasSpinning Webs — Unveiling Arachne for Web Shell C2Web Shell Agent for Mythic C2Feb 7