C2 Active Scanner
☆59Jun 19, 2024Updated last year
Alternatives and similar repositories for NoWhere2Hide
Users that are interested in NoWhere2Hide are comparing it to the libraries listed below
Sorting:
- ☆24Sep 28, 2022Updated 3 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago
- Converting data from services like Censys and Shodan to a common data model☆52Feb 22, 2026Updated last week
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Script to chain search parameters for MalwareBazaar☆13Jan 26, 2025Updated last year
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated last month
- Web Application for domain name monitoring / alerting☆64Aug 1, 2024Updated last year
- YARA Language Server☆74Feb 3, 2026Updated 3 weeks ago
- A scanner for taking basic fingerprints☆50Oct 1, 2020Updated 5 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Jan 8, 2026Updated last month
- ☆34Nov 11, 2025Updated 3 months ago
- ☆21Apr 19, 2024Updated last year
- Live Feed of C2 servers, tools, and botnets☆749Feb 23, 2026Updated last week
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- URL fingerprinting made easy☆89Apr 13, 2024Updated last year
- VirusTotal Intelligence Search☆40May 21, 2020Updated 5 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 2 years ago
- Automatically created C2 Feeds☆666Updated this week
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆112Updated this week
- ☆27Nov 26, 2024Updated last year
- THOR Thunderstorm Collectors☆25Updated this week
- ☆12Feb 24, 2023Updated 3 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- ☆105Dec 9, 2025Updated 2 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆13Jul 14, 2020Updated 5 years ago