Live Feed of C2 servers, tools, and botnets
☆771Apr 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for C2-Tracker
Users that are interested in C2-Tracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Track C2 servers, tools, and botnets over time by framework and location☆43Feb 9, 2025Updated last year
- Automatically created C2 Feeds☆677Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆826Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆654Aug 4, 2025Updated 8 months ago
- A resource containing all the tools each ransomware gangs uses☆1,355Apr 1, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 4 months ago
- C2 Active Scanner☆58Jun 19, 2024Updated last year
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- A curated list of Awesome Threat Intelligence Blogs☆540Updated this week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆119Oct 29, 2024Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆820Apr 18, 2026Updated 2 weeks ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,768Apr 16, 2026Updated 2 weeks ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,824Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Awesome Security lists for SOC/CERT/CTI☆1,437Updated this week
- Interesting APT Report Collection And Some Special IOCs☆2,974Apr 23, 2026Updated last week
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆653Updated this week
- ☆570Mar 28, 2024Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆198Dec 20, 2024Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,948Apr 24, 2026Updated last week
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆121Sep 17, 2025Updated 7 months ago
- Yet another Ransomware gang tracker☆591Updated this week
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,687Apr 13, 2026Updated 2 weeks ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆182Apr 17, 2026Updated 2 weeks ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆143Apr 20, 2023Updated 3 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆720Apr 25, 2026Updated last week
- Map tracking ransomware, by OCD World Watch team☆487Feb 20, 2026Updated 2 months ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,135Updated this week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆128Dec 5, 2023Updated 2 years ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆399Apr 3, 2024Updated 2 years ago
- ☆509Oct 7, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,408Nov 7, 2024Updated last year
- Extract and aggregate threat intelligence.☆911Jan 31, 2024Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Mar 14, 2026Updated last month
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Welcome to the SEKOIA.IO Community repository!☆184Updated this week
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,074Mar 10, 2026Updated last month
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆205Jul 3, 2024Updated last year