Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.
☆446Oct 26, 2022Updated 3 years ago
Alternatives and similar repositories for imaginaryC2
Users that are interested in imaginaryC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆266Jan 15, 2022Updated 4 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.☆644Nov 27, 2024Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆364Mar 4, 2026Updated 2 weeks ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- c2 traffic☆194Feb 6, 2023Updated 3 years ago
- Quickly debug shellcode extracted during malware analysis☆627May 23, 2023Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- FAME Automates Malware Evaluation☆931Dec 16, 2025Updated 3 months ago
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- Obfuscate specific windows apis with different apis☆1,023Feb 21, 2021Updated 5 years ago
- Static based decoders for malware samples☆94Jul 27, 2020Updated 5 years ago
- DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2…☆448Aug 7, 2020Updated 5 years ago
- Windows kernel and user mode emulation.☆1,896Mar 12, 2026Updated last week
- Malware Configuration And Payload Extraction☆762Nov 22, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,722Sep 23, 2025Updated 6 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,141Oct 19, 2025Updated 5 months ago
- Kaspersky's GReAT KLara☆733Jul 24, 2024Updated last year
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆185Mar 30, 2019Updated 6 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92May 23, 2019Updated 6 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆843Mar 11, 2021Updated 5 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Open source pre-operation C2 server based on python and powershell☆763Jul 6, 2021Updated 4 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Oct 5, 2020Updated 5 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,735Jan 16, 2026Updated 2 months ago
- Silencing Sysmon via driver unload☆236Oct 13, 2022Updated 3 years ago
- Malware Repository Framework☆98Mar 5, 2018Updated 8 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Jul 16, 2023Updated 2 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,955Updated this week
- UAC Bypass with mmc via alpc☆158Apr 5, 2019Updated 6 years ago
- For all these times you're asking yourself "what is this panel again?"☆261Jan 29, 2026Updated last month
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,616Dec 10, 2018Updated 7 years ago
- POC for utilizing wikipedia API for Command and Control☆28Dec 8, 2022Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- TA505 unpacker Python 2.7☆46Jun 22, 2020Updated 5 years ago