montysecurity / C2-TrackerLinks
Live Feed of C2 servers, tools, and botnets
☆688Updated last week
Alternatives and similar repositories for C2-Tracker
Users that are interested in C2-Tracker are comparing it to the libraries listed below
Sorting:
- Yet another Ransomware gang tracker☆466Updated this week
- A centralized and enhanced memory analysis platform☆481Updated 3 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆592Updated last month
- A resource containing all the tools each ransomware gangs uses☆1,096Updated 3 weeks ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆370Updated last week
- Awesome Security lists for SOC/CERT/CTI☆1,052Updated this week
- 🏴☠️💰 Another Ransomware gang tracker☆231Updated this week
- Automatically created C2 Feeds☆631Updated this week
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆356Updated this week
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆220Updated 2 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆695Updated 6 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆708Updated 2 weeks ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆677Updated 5 months ago
- Map tracking ransomware, by OCD World Watch team☆468Updated 5 months ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆579Updated this week
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆705Updated last week
- ☆513Updated 9 months ago
- CLI tools for forensic investigation of Windows artifacts☆344Updated 2 weeks ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆400Updated last year
- ☆529Updated last month
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆328Updated this week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆259Updated last month
- ☆197Updated last year
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆370Updated 11 months ago
- A collection of phishing samples for researchers and detection developers.☆339Updated last week
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆310Updated 2 months ago
- Ransomware simulator written in Golang☆442Updated 3 years ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆703Updated last month
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆400Updated 2 months ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆660Updated last week