Mythic-container

Latest version: v0.5.19

Safety actively analyzes 693883 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 8

0.5.19

Changed

- Updated the MythicRPCCallbackSearch to allow specifying Payload Type names
- Updated the MythicRPCCallbackAddCommand and MythicRPCCallbackRemoveCommand functions to allow specifying list of callback IDs

0.5.18

Changed

- Updated the SendMythicRPCSyncPayloadType functionality to force Mythic to NOT re-call the on_start functionality
- This needs Mythic v3.3.1-rc31+

0.5.17

Changed

- Added ReprocessAtNewCommandPayloadType option for create_go_tasking response
- Added AgentCallbackID and PayloadType to MythicRPCCallbackAddCommand and MythicRPCCallbackRemoveCommand messages
- Added more checks when syncing commands to make sure that duplicates aren't processed
- Added new SendMythicRPCSync* functions in the base classes for the following classes
- PayloadBuilder
- This one in particular has you specify a set of additional commands (potentially dynamically created) to sync with Mythic
- WebhookBase
- AuthBase
- EventingBase
- LoggingBase
- This will allow you to make changes to your class definitions as needed and re-sync the updates to Mythic when you want

0.5.16

Changed

- Merged Evan McBroom's PR to fix missing imports in the MythicGoRPC Folder

0.5.15

Changed

- Added Evan McBroom's PR for multi-level inheritance (https://github.com/MythicMeta/MythicContainerPyPi/pull/12)
- Added support for specifying username/password for proxy stop
- Added support for specifying in the agent definition if original or display parameters should be used in the cli history
- This is an effort to reduce the amount of JSON users might see if they up/down arrow on the command line
- This defaults to false, but if you set it to true then you should make sure that your `response.DisplayParams` are a valid format for tasking

0.5.13

Changed

- Added mutex around starting/stopping the internal server
- Updated many C2 RPC functions to allow them to ask for the internal server to restart
- Added explicit update function for c2 internal server status
- Added username/password options when starting socks proxy
- Added 'remove' option in hosting files via c2

Page 1 of 8

© 2025 Safety CLI Cybersecurity Inc. All Rights Reserved.