ThreatMon / ThreatMon-Daily-C2-FeedsView external linksLinks
IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.
☆69Dec 27, 2023Updated 2 years ago
Alternatives and similar repositories for ThreatMon-Daily-C2-Feeds
Users that are interested in ThreatMon-Daily-C2-Feeds are comparing it to the libraries listed below
Sorting:
- ☆52Aug 19, 2025Updated 5 months ago
- Extended Static Analysis Tool for Analyzing Android APK Files.☆14Jan 3, 2024Updated 2 years ago
- ☆34Nov 11, 2025Updated 3 months ago
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆16Nov 10, 2023Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆68Dec 7, 2025Updated 2 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆757Jan 28, 2025Updated last year
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- Source code used at TweetFeed.live☆48Nov 21, 2022Updated 3 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated last year
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- cryptam document malware analysis tool☆12Jun 18, 2023Updated 2 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- Repository for archiving Cobalt Strike configuration☆36Feb 5, 2026Updated last week
- Compare different privacy-oriented browsers and find the best private browser(s) for your use.☆17Feb 6, 2025Updated last year
- ☆12Jul 15, 2022Updated 3 years ago
- Script to chain search parameters for MalwareBazaar☆12Jan 26, 2025Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Building an Intrusion detection system using KDD Cup 99 Dataset☆15May 11, 2020Updated 5 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆69Updated this week
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- ☆32Oct 16, 2025Updated 4 months ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated 3 weeks ago
- Basically pipes.sh but rewritten in Python☆13Nov 16, 2025Updated 3 months ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- Extract the Procedures (TTP) from CTI reports☆16Dec 13, 2025Updated 2 months ago
- Sentinel Logic Apps, Playbooks and Workbooks to automate enrichment, incident analysis and more.☆115Jan 18, 2026Updated last month
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆42Jan 20, 2026Updated 3 weeks ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Apr 23, 2025Updated 9 months ago