montysecurity / C2-TrackerLinks
Live Feed of C2 servers, tools, and botnets
☆743Updated last week
Alternatives and similar repositories for C2-Tracker
Users that are interested in C2-Tracker are comparing it to the libraries listed below
Sorting:
- Yet another Ransomware gang tracker☆558Updated this week
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆400Updated 2 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆631Updated 6 months ago
- A centralized and enhanced memory analysis platform☆517Updated 6 months ago
- A resource containing all the tools each ransomware gangs uses☆1,322Updated last month
- Automatically created C2 Feeds☆662Updated this week
- 🏴☠️💰 Another Ransomware gang tracker☆290Updated 3 weeks ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆745Updated last year
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆445Updated this week
- CLI tools for forensic investigation of Windows artifacts☆349Updated 6 months ago
- Map tracking ransomware, by OCD World Watch team☆483Updated 2 weeks ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆224Updated 5 months ago
- Awesome Security lists for SOC/CERT/CTI☆1,239Updated this week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆764Updated 3 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆509Updated this week
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆634Updated this week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆724Updated 6 months ago
- A collection of phishing samples for researchers and detection developers.☆393Updated this week
- ☆513Updated last year
- Ransomware simulator written in Golang☆470Updated 3 years ago
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆116Updated 4 months ago
- ☆542Updated 5 months ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆458Updated last year
- ☆380Updated this week
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆693Updated 3 months ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆415Updated last year
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,088Updated 7 months ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆391Updated last week
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,035Updated 3 weeks ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆274Updated 7 months ago