Protect mission-critical assets from identity compromise with new Privilege Zones in BloodHound Enterprise. Learn More

  • Blog
  • Support
  • Contact Us
    • Blog
    • Support
    • Contact Us
  • Services
    • PROGRAM DEVELOPMENT
      • Overview
      • Developing Capabilities
      • Expert Support
    • Assessments
      • Penetration Testing
      • Red Team Engagements
      • Purple Team Assessments
      • Maturity Assessments
      • AD Attack Path Assessments
      • Artificial Intelligence Red Team
  • Products
    • BLOODHOUND
      • BloodHound Community Edition
        • Overview
        • BloodHound Feature Comparisons
        • GitHub
        • Get Started
      • BloodHound Enterprise
        • Overview
          • What is Attack Path Management?
          • Interactive Demos
          • BloodHound Feature Comparisons
          • Privilege Zones
        • Use Cases
          • Privileged Access Governance and Compliance
          • Scaling Beyond BloodHound Community Edition
          • Eliminate Lateral Movement
          • Manage Identity Risk
          • Mergers and Acquisitions
        • Industry
          • Public Sector
          • Financial Services
          • Healthcare
        • Support
        • Get a Demo
    • Go to Slack
    • Go to Docs
  • Training
    • Adversary Tactics Training Courses
      • Red Team Operations
      • Identity-Driven Offensive Tradecraft
      • Tradecraft Analysis
      • Detection
      • Vulnerability Research for Operators
      • Active Directory Security Fundamentals
      • Adversary Perspectives: Azure
    • Private Training
      • Talk to us
  • Partners
    • SpecterOps Partner Program
    • Identify your customers attack paths before attackers do
      • Become a Partner
      • Partner Portal Sign In
  • About
    • ABOUT US
      • Who We Are
      • Values
      • Team
      • Careers
      • Contact Us
  • News
    • Announcements
    • Newsroom
  • Resources
    • RESOURCES
      • Blog
      • Research & Insights
      • White Papers
      • Case Studies
      • Sponsored Tools
      • Vulnerability Acknowledgements
      • Datasheets
  • Events
    • Sponsored Events
    • Talks
    • Training Courses
    • Webinars
    • Meet Ups
Get a Demo
Get a Demo
< Back to Blog
Default Author Image

Cody Thomas

See the latest by Cody Thomas

Image for post titled Mythic 3.3 — Out of Beta

Mythic 3.3 — Out of Beta

Mythic 3.3 — Out of Beta Mythic 3.3 was released in a Beta six weeks ago, and since then...

By: Cody Thomas
Aug 28, 2024 • 10 min read
Read Post
Image for post titled Mythic 3.3 Beta: Rise of the Events

Mythic 3.3 Beta: Rise of the Events

A brief overview of Mythic 3.3’s new features Eventing Flows Mythic 3.3 Updates Mythic 3.3 has too many...

By: Cody Thomas
Jul 15, 2024 • 8 min read
Read Post
Image for post titled Agent Customization in Mythic: Tailoring Tools for Red Team Needs

Agent Customization in Mythic: Tailoring Tools for Red Team Needs

By: Cody Thomas
Mar 27, 2024 • 9 min read
Read Post
Image for post titled Spinning Webs — Unveiling Arachne for Web Shell C2

Spinning Webs — Unveiling Arachne for Web Shell C2

Spinning Webs — Unveiling Arachne for Web Shell C2 What is a web shell? A web shell is a payload...

By: Cody Thomas
Feb 7, 2024 • 11 min read
Read Post
Image for post titled Mythic v3.2 Highlights: Interactive Tasking, Push C2, and Dynamic File Browser

Mythic v3.2 Highlights: Interactive Tasking, Push C2, and Dynamic File Browser

TL;DR; Mythic v3.2 has Push C2, Interactive Async Tasking, TypedArray parameters, new graphing libraries in the...

By: Cody Thomas
Nov 29, 2023 • 10 min read
Read Post
Image for post titled C2 and the Docker Dance: Mythic 3.0’s Marvelous Microservice Moves

C2 and the Docker Dance: Mythic 3.0’s Marvelous Microservice Moves

— Title by ChatGPT for introducing Mythic 3.0 What is Mythic? Mythic is a plug-n-play command and control...

By: Cody Thomas
May 10, 2023 • 13 min read
Read Post
Image for post titled Mythic 2.3 — An Interface Reborn

Mythic 2.3 — An Interface Reborn

Mythic 2.3 — An Interface Reborn New Mythic Search Mythic started off as a proof of concept, open source...

By: Cody Thomas
Jan 31, 2022 • 13 min read
Read Post
Image for post titled Learning from our Myths

Learning from our Myths

By: Cody Thomas
Jun 22, 2021 • 20 min read
Read Post
Image for post titled Sharing the Myth

Sharing the Myth

By: Cody Thomas
Nov 9, 2020 • 4 min read
Read Post
1 2 Next
Demystifying Adversary Tradecraft
Sign Up For Updates From SpecterOps
  • Sign Up For Updates From SpecterOps

  • This field is for validation purposes and should be left unchanged.

  • Services
    • Program Development
      • Developing Capabilities
      • Expert Support
    • Assessments
      • Penetration Testing
      • Red Team Engagements
      • Purple Team Assessments
      • Maturity Assessments
      • AD Attack Path Assessment
      • Artificial Intelligence Red Team
  • Products
    • BloodHound Community Edition
      • Overview
        • BloodHound Feature Comparison
      • GitHub
      • Get Started
    • BloodHound Enterprise
      • Overview
        • What is Attack Path Management?
        • Interactive Demos
        • BloodHound Feature Comparison
      • Use Cases
        • Privileged Access Governance and Compliance
        • Scaling Beyond BloodHound Community Edition
        • Eliminate Lateral Movement
        • Manage Identity Risk
        • Mergers and Acquisitions
      • Industry
        • Public Sector
        • Financial Services
        • Healthcare
      • Support
      • Get a Demo
  • Training
    • Adversary Tactics Training Courses
      • Red Team Operations
      • Identity-Driven Offensive Tradecraft
      • Tradecraft Analysis
      • Detection
      • Vulnerability Research for Operators
      • Active Directory Security Fundamentals
      • Adversary Perspectives: Azure
      • Private Training
  • News
    • Announcements
    • Newsroom
  • About Us
    • Who We Are
    • Values
    • Team
    • Careers
    • Contact Us
  • Resources
    • White Papers
    • Case Studies
    • Sponsored Tools
    • Vulnerability Acknowledgements
    • Datasheets
  • Blog
  • Events
    • Sponsored Events
    • Talks
    • Training Courses
    • Webinars
    • Meet Ups
Great Place to Work

Copyright 2025 Specter Ops, Inc. All Rights Reserved.

Terms of Service Privacy Policy Trust Center