montysecurity / C2-TrackerLinks
Live Feed of C2 servers, tools, and botnets
☆711Updated last week
Alternatives and similar repositories for C2-Tracker
Users that are interested in C2-Tracker are comparing it to the libraries listed below
Sorting:
- Yet another Ransomware gang tracker☆503Updated 2 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆611Updated 2 months ago
- A resource containing all the tools each ransomware gangs uses☆1,260Updated last week
- A centralized and enhanced memory analysis platform☆504Updated 3 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆383Updated last week
- Automatically created C2 Feeds☆648Updated last week
- Map tracking ransomware, by OCD World Watch team☆476Updated 7 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆263Updated last month
- CLI tools for forensic investigation of Windows artifacts☆345Updated 3 months ago
- Awesome Security lists for SOC/CERT/CTI☆1,149Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆717Updated 8 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆381Updated this week
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆600Updated this week
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆223Updated 2 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆737Updated last month
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆751Updated this week
- Gets updates from various clearnet domains and ransomware threat actor domains☆406Updated last year
- ☆513Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆398Updated last month
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆393Updated last year
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆341Updated 2 weeks ago
- A collection of phishing samples for researchers and detection developers.☆354Updated last week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆714Updated 2 months ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆678Updated 3 months ago
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆115Updated last month
- ☆375Updated last week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆264Updated 4 months ago
- Ransomware simulator written in Golang☆451Updated 3 years ago
- ☆538Updated last month
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆406Updated 5 months ago