Daily C2 threat intelligence feed
☆19Mar 16, 2026Updated this week
Alternatives and similar repositories for C2watcher
Users that are interested in C2watcher are comparing it to the libraries listed below
Sorting:
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 4 months ago
- ☆16Mar 12, 2026Updated last week
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 8 months ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- In-depth security research into VAC’s dynamic anti-cheat delivery model, focusing on loader architecture, integrity checks, and defensive…☆22Sep 1, 2025Updated 6 months ago
- Cuckoo Agent.☆23Feb 25, 2019Updated 7 years ago
- The repository contains three lists. You only need to use one. Global proxy list or proxy list from RU, BU, KZ or proxy list by RU region☆10Updated this week
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆18Jan 13, 2024Updated 2 years ago
- a Powershell script to Create / Populate a dummy Active Directory☆15May 28, 2024Updated last year
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆60Feb 27, 2026Updated 3 weeks ago
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆59Nov 24, 2025Updated 3 months ago
- ☆21Nov 19, 2025Updated 4 months ago
- Downloads all images from an album with the full resolution.☆12Jan 22, 2024Updated 2 years ago
- ☆15Feb 22, 2021Updated 5 years ago
- Google maps wifi geolocation using python☆13May 14, 2015Updated 10 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- TakedownGPT combines a LangChain Agent with OpenAI function calling to automate the discovery of domain registrars and drafting of takedo…☆49Jan 31, 2026Updated last month
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆14Aug 22, 2020Updated 5 years ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆40Oct 24, 2025Updated 4 months ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆78Sep 16, 2025Updated 6 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- Utility scripts for useful tasks.☆18Mar 29, 2023Updated 2 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- PostMaster is a beautiful web application to manage domains, users, and aliases on a Linux mail server☆18May 21, 2018Updated 7 years ago
- A dataset of global salaries in InfoSec/Cybersecurity.☆21Mar 1, 2026Updated 2 weeks ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.