Daily C2 threat intelligence feed
☆19Apr 6, 2026Updated this week
Alternatives and similar repositories for C2watcher
Users that are interested in C2watcher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 5 months ago
- ☆16Mar 12, 2026Updated 3 weeks ago
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 9 months ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- In-depth security research into VAC’s dynamic anti-cheat delivery model, focusing on loader architecture, integrity checks, and defensive…☆24Sep 1, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Cuckoo Agent.☆23Feb 25, 2019Updated 7 years ago
- The repository contains three lists. You only need to use one. Global proxy list or proxy list from RU, BU, KZ or proxy list by RU region☆10Mar 27, 2026Updated 2 weeks ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆18Jan 13, 2024Updated 2 years ago
- a Powershell script to Create / Populate a dummy Active Directory☆15May 28, 2024Updated last year
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- ☆21Nov 19, 2025Updated 4 months ago
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆60Nov 24, 2025Updated 4 months ago
- Downloads all images from an album with the full resolution.☆12Jan 22, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆63Feb 27, 2026Updated last month
- ☆15Feb 22, 2021Updated 5 years ago
- Google maps wifi geolocation using python☆13May 14, 2015Updated 10 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- TakedownGPT combines a LangChain Agent with OpenAI function calling to automate the discovery of domain registrars and drafting of takedo…☆49Jan 31, 2026Updated 2 months ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆14Aug 22, 2020Updated 5 years ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆40Oct 24, 2025Updated 5 months ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- Utility scripts for useful tasks.☆18Mar 29, 2023Updated 3 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- PostMaster is a beautiful web application to manage domains, users, and aliases on a Linux mail server☆18May 21, 2018Updated 7 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- A dataset of global salaries in InfoSec/Cybersecurity.☆21Mar 1, 2026Updated last month
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆83Sep 16, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Simple but Powerful website like Udemy.com for Students and Instructors (Udemy-clone) :)☆13Feb 15, 2019Updated 7 years ago
- 🪷 Hyper-V Toolbox: Streamlining Virtual Machine Management. Providing users with a more efficient and user-friendly tool for virtual mac…☆27Mar 16, 2025Updated last year
- AD Live changes viewer☆36Feb 25, 2023Updated 3 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Shellcode loader with evasion capabilities written in Nim☆16Jan 25, 2025Updated last year