Track C2 servers, tools, and botnets over time by framework and location
☆43Feb 9, 2025Updated last year
Alternatives and similar repositories for C2Live
Users that are interested in C2Live are comparing it to the libraries listed below
Sorting:
- Live Feed of C2 servers, tools, and botnets☆749Feb 23, 2026Updated last week
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- A triage data collection script for macOS☆29Nov 27, 2020Updated 5 years ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- A pure PowerShell/ .NET DFIR capability that dumps the Windows SRUM (System Resource Usage Monitor) database to CSVs for analysis.☆14Oct 21, 2021Updated 4 years ago
- My favorite resources and tools for malware analysis.☆43Aug 18, 2020Updated 5 years ago
- ☆18Mar 26, 2025Updated 11 months ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Aug 30, 2022Updated 3 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- ☆17Jan 21, 2026Updated last month
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Powershell sandboxing utility☆20Feb 2, 2026Updated last month
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Outil de récupération automatique des données AZure / Automated tool for dumping Azure configuration data☆21Nov 13, 2025Updated 3 months ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Dec 8, 2024Updated last year
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- ☆120May 26, 2025Updated 9 months ago
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 8 months ago
- SMTP honeypot written in Golang☆33Aug 9, 2016Updated 9 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- Mine patterns from logs☆27Dec 12, 2016Updated 9 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- All the silver bullet(open bullet) configs I made for educational purposes about brute forcing☆13Nov 10, 2024Updated last year
- ☆33Feb 26, 2022Updated 4 years ago
- Quick Cache and Archive search buttons☆39May 11, 2024Updated last year
- Writeups for CTF challenges☆35Nov 12, 2023Updated 2 years ago
- ☆34May 24, 2023Updated 2 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year