Live Feed of C2 servers, tools, and botnets
☆775Apr 13, 2026Updated last month
Alternatives and similar repositories for C2-Tracker
Users that are interested in C2-Tracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Track C2 servers, tools, and botnets over time by framework and location☆43Feb 9, 2025Updated last year
- Automatically created C2 Feeds☆716Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆835Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- A resource containing all the tools each ransomware gangs uses☆1,367May 11, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,219Dec 29, 2025Updated 4 months ago
- C2 Active Scanner☆58Jun 19, 2024Updated last year
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- A curated list of Awesome Threat Intelligence Blogs☆542Apr 27, 2026Updated 3 weeks ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆119Oct 29, 2024Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆822Apr 18, 2026Updated last month
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,822Apr 16, 2026Updated last month
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,870May 15, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Awesome Security lists for SOC/CERT/CTI☆1,462Updated this week
- Interesting APT Report Collection And Some Special IOCs☆2,986May 9, 2026Updated 2 weeks ago
- ☆571Mar 28, 2024Updated 2 years ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆659Updated this week
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆203Dec 20, 2024Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,951May 14, 2026Updated last week
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆122Sep 17, 2025Updated 8 months ago
- Yet another Ransomware gang tracker☆608Updated this week
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,694May 10, 2026Updated last week
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆184Apr 17, 2026Updated last month
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆143Apr 20, 2023Updated 3 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆722Apr 25, 2026Updated 3 weeks ago
- Map tracking ransomware, by OCD World Watch team☆487Feb 20, 2026Updated 3 months ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,169Updated this week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆128Dec 5, 2023Updated 2 years ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆403Apr 3, 2024Updated 2 years ago
- ☆508Oct 7, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,408Nov 7, 2024Updated last year
- Extract and aggregate threat intelligence.☆910Jan 31, 2024Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆300May 11, 2026Updated last week
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Welcome to the SEKOIA.IO Community repository!☆185May 7, 2026Updated 2 weeks ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,077May 11, 2026Updated last week
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆205Jul 3, 2024Updated last year