securelist.com/agent-for-mythic-c2-with-beacon-object-files/115259

Preview meta tags from the securelist.com website.

Linked Hostnames

18

Thumbnail

Search Engine Appearance

Google

https://securelist.com/agent-for-mythic-c2-with-beacon-object-files/115259

Using an agent for the Mythic framework: pros and cons in pentesting

Kaspersky experts discuss optimizing penetration testing with an agent for the Mythic framework and object files for Cobalt Strike.



Bing

Using an agent for the Mythic framework: pros and cons in pentesting

https://securelist.com/agent-for-mythic-c2-with-beacon-object-files/115259

Kaspersky experts discuss optimizing penetration testing with an agent for the Mythic framework and object files for Cobalt Strike.



DuckDuckGo

https://securelist.com/agent-for-mythic-c2-with-beacon-object-files/115259

Using an agent for the Mythic framework: pros and cons in pentesting

Kaspersky experts discuss optimizing penetration testing with an agent for the Mythic framework and object files for Cobalt Strike.

  • General Meta Tags

    9
    • title
      Using an agent for the Mythic framework: pros and cons in pentesting | Securelist
    • charset
      UTF-8
    • Content-Type
      text/html;charset=utf-8
    • viewport
      width=device-width, initial-scale=1.0
    • X-UA-Compatible
      IE=Edge
  • Open Graph Meta Tags

    5
    • og:type
      article
    • og:title
      Using an agent for the Mythic framework: pros and cons in pentesting
    • og:description
      Kaspersky experts discuss optimizing penetration testing with an agent for the Mythic framework and object files for Cobalt Strike.
    • og:url
      https://securelist.com/agent-for-mythic-c2-with-beacon-object-files/115259/
    • og:image
      https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2025/01/20152120/mythic-agent-featured-image.jpg
  • Twitter Meta Tags

    6
    • twitter:card
      summary_large_image
    • twitter:site
      @Securelist
    • twitter:creator
      @Securelist
    • twitter:title
      Using an agent for the Mythic framework: pros and cons in pentesting
    • twitter:description
      Kaspersky experts discuss optimizing penetration testing with an agent for the Mythic framework and object files for Cobalt Strike.
  • Link Tags

    26
    • EditURI
      https://securelist.com/xmlrpc.php?rsd
    • alternate
      https://securelist.com/feed/
    • alternate
      https://securelist.com/comments/feed/
    • alternate
      https://securelist.com/agent-for-mythic-c2-with-beacon-object-files/115259/feed/
    • alternate
      https://securelist.com/wp-json/wp/v2/posts/115259
  • Website Locales

    2
    • RU country flagru
      https://securelist.ru/agent-for-mythic-c2-with-beacon-object-files/111476/
    • DEFAULT country flagx-default
      https://securelist.com/agent-for-mythic-c2-with-beacon-object-files/115259/

Links

215