Live Feed of C2 servers, tools, and botnets
☆766Apr 6, 2026Updated this week
Alternatives and similar repositories for C2-Tracker
Users that are interested in C2-Tracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Track C2 servers, tools, and botnets over time by framework and location☆43Feb 9, 2025Updated last year
- Automatically created C2 Feeds☆671Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆817Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆650Aug 4, 2025Updated 8 months ago
- A resource containing all the tools each ransomware gangs uses☆1,343Apr 1, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- C2 Active Scanner☆57Jun 19, 2024Updated last year
- A curated list of Awesome Threat Intelligence Blogs☆526Mar 23, 2026Updated 2 weeks ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆118Oct 29, 2024Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Mar 6, 2026Updated last month
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,732Mar 21, 2026Updated 3 weeks ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,783Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Awesome Security lists for SOC/CERT/CTI☆1,403Updated this week
- Interesting APT Report Collection And Some Special IOCs☆2,959Apr 5, 2026Updated last week
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆650Updated this week
- ☆570Mar 28, 2024Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆196Dec 20, 2024Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,942Mar 26, 2026Updated 2 weeks ago
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆121Sep 17, 2025Updated 6 months ago
- Yet another Ransomware gang tracker☆571Updated this week
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,679Apr 3, 2026Updated last week
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆182Apr 1, 2026Updated last week
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆142Apr 20, 2023Updated 2 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆712Apr 21, 2025Updated 11 months ago
- Map tracking ransomware, by OCD World Watch team☆487Feb 20, 2026Updated last month
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,106Mar 21, 2026Updated 3 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆397Apr 3, 2024Updated 2 years ago
- ☆510Oct 7, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,406Nov 7, 2024Updated last year
- Extract and aggregate threat intelligence.☆909Jan 31, 2024Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Mar 14, 2026Updated 3 weeks ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Welcome to the SEKOIA.IO Community repository!☆183Mar 30, 2026Updated last week
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,066Mar 10, 2026Updated last month
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year