Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.
☆448Oct 26, 2022Updated 3 years ago
Alternatives and similar repositories for imaginaryC2
Users that are interested in imaginaryC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆267Jan 15, 2022Updated 4 years ago
- Various snippets created during malware analysis☆466Oct 3, 2025Updated 7 months ago
- Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.☆644Nov 27, 2024Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆364Mar 4, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- c2 traffic☆196Feb 6, 2023Updated 3 years ago
- Quickly debug shellcode extracted during malware analysis☆634May 23, 2023Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- FAME Automates Malware Evaluation☆939Updated this week
- HTA encryption tool for RedTeams☆1,426Nov 9, 2022Updated 3 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- Static based decoders for malware samples☆94Jul 27, 2020Updated 5 years ago
- DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2…☆448Aug 7, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Malware Configuration And Payload Extraction☆760Nov 22, 2024Updated last year
- Windows kernel and user mode emulation.☆1,949Apr 8, 2026Updated 3 weeks ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,735Sep 23, 2025Updated 7 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,171Apr 22, 2026Updated last week
- Kaspersky's GReAT KLara☆733Jul 24, 2024Updated last year
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆183Mar 30, 2019Updated 7 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92May 23, 2019Updated 6 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆848Mar 11, 2021Updated 5 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Open source pre-operation C2 server based on python and powershell☆766Jul 6, 2021Updated 4 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆183Oct 5, 2020Updated 5 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,756Jan 16, 2026Updated 3 months ago
- Silencing Sysmon via driver unload☆238Oct 13, 2022Updated 3 years ago
- Malware Repository Framework☆98Mar 5, 2018Updated 8 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- UAC Bypass with mmc via alpc☆160Apr 5, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Interesting APT Report Collection And Some Special IOCs☆2,974Apr 23, 2026Updated last week
- For all these times you're asking yourself "what is this panel again?"☆262Jan 29, 2026Updated 3 months ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,614Dec 10, 2018Updated 7 years ago
- POC for utilizing wikipedia API for Command and Control☆29Dec 8, 2022Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255May 1, 2023Updated 3 years ago
- TA505 unpacker Python 2.7☆46Jun 22, 2020Updated 5 years ago