Daily C2 threat intelligence feed
☆19Apr 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for C2watcher
Users that are interested in C2watcher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 6 months ago
- ☆16Mar 12, 2026Updated last month
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 10 months ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- In-depth security research into VAC’s dynamic anti-cheat delivery model, focusing on loader architecture, integrity checks, and defensive…☆25Sep 1, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cuckoo Agent.☆23Feb 25, 2019Updated 7 years ago
- The repository contains three lists. You only need to use one. Global proxy list or proxy list from RU, BU, KZ or proxy list by RU region☆10Mar 27, 2026Updated last month
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆18Jan 13, 2024Updated 2 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- a Powershell script to Create / Populate a dummy Active Directory☆15May 28, 2024Updated last year
- ☆21Nov 19, 2025Updated 5 months ago
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆61Nov 24, 2025Updated 5 months ago
- Downloads all images from an album with the full resolution.☆12Jan 22, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆15Feb 22, 2021Updated 5 years ago
- Google maps wifi geolocation using python☆13May 14, 2015Updated 10 years ago
- TakedownGPT combines a LangChain Agent with OpenAI function calling to automate the discovery of domain registrars and drafting of takedo…☆49Jan 31, 2026Updated 3 months ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆14Aug 22, 2020Updated 5 years ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆42Oct 24, 2025Updated 6 months ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 5 months ago
- Utility scripts for useful tasks.☆18Mar 29, 2023Updated 3 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- PostMaster is a beautiful web application to manage domains, users, and aliases on a Linux mail server☆18May 21, 2018Updated 7 years ago
- A dataset of global salaries in InfoSec/Cybersecurity.☆21Mar 1, 2026Updated last month
- Simple reverse ICMP shell☆14Apr 30, 2024Updated 2 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆13Dec 13, 2023Updated 2 years ago
- A Simple but Powerful website like Udemy.com for Students and Instructors (Udemy-clone) :)☆13Feb 15, 2019Updated 7 years ago
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆85Sep 16, 2025Updated 7 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🪷 Hyper-V Toolbox: Streamlining Virtual Machine Management. Providing users with a more efficient and user-friendly tool for virtual mac…☆27Mar 16, 2025Updated last year
- AD Live changes viewer☆36Feb 25, 2023Updated 3 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Shellcode loader with evasion capabilities written in Nim☆16Jan 25, 2025Updated last year
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆30Sep 17, 2024Updated last year