montysecurity / C2-Tracker
Live Feed of C2 servers, tools, and botnets
☆619Updated last week
Alternatives and similar repositories for C2-Tracker:
Users that are interested in C2-Tracker are comparing it to the libraries listed below
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆663Updated 2 months ago
- Yet another Ransomware gang tracker☆414Updated last week
- A centralized and enhanced memory analysis platform☆453Updated 2 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆559Updated last month
- Automatically created C2 Feeds☆600Updated this week
- A resource containing all the tools each ransomware gangs uses☆1,007Updated last month
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆353Updated 2 weeks ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆206Updated 5 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆640Updated last month
- 🏴☠️💰 Another Ransomware gang tracker☆192Updated 2 weeks ago
- CLI tools for forensic investigation of Windows artifacts☆327Updated 5 months ago
- Map tracking ransomware, by OCD World Watch team☆464Updated last month
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆622Updated last month
- ☆515Updated 6 months ago
- Awesome Security lists for SOC/CERT/CTI☆934Updated this week
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆289Updated this week
- Practical Windows Forensics Training☆657Updated last year
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆709Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 11 months ago
- ☆195Updated last year
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆235Updated last month
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆342Updated 8 months ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆388Updated 11 months ago
- Ransomware simulator written in Golang☆433Updated 2 years ago
- A RedTeam Toolkit☆395Updated 3 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆658Updated last week
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆619Updated last month
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆709Updated 2 weeks ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆184Updated 4 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆664Updated 5 months ago