Live Feed of C2 servers, tools, and botnets
☆749Feb 23, 2026Updated last week
Alternatives and similar repositories for C2-Tracker
Users that are interested in C2-Tracker are comparing it to the libraries listed below
Sorting:
- Automatically created C2 Feeds☆666Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆773Jan 28, 2025Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆638Aug 4, 2025Updated 6 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Feb 9, 2025Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,205Dec 29, 2025Updated 2 months ago
- A resource containing all the tools each ransomware gangs uses☆1,330Dec 24, 2025Updated 2 months ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆817Feb 17, 2025Updated last year
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,547Jan 20, 2026Updated last month
- A curated list of Awesome Threat Intelligence Blogs☆506Feb 16, 2026Updated 2 weeks ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,609Updated this week
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- ☆568Mar 28, 2024Updated last year
- Interesting APT Report Collection And Some Special IOCs☆2,915Feb 24, 2026Updated last week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆117Oct 29, 2024Updated last year
- Awesome Security lists for SOC/CERT/CTI☆1,263Updated this week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,927Jan 20, 2026Updated last month
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,037Feb 24, 2026Updated last week
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,402Nov 7, 2024Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆704Apr 21, 2025Updated 10 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,408Jan 19, 2026Updated last month
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆637Updated this week
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,638Feb 22, 2026Updated last week
- Yet another Ransomware gang tracker☆562Feb 24, 2026Updated last week
- Nuclei templates for honeypots detection.☆196Nov 7, 2023Updated 2 years ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆389Apr 3, 2024Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆1,011Jan 7, 2026Updated last month
- ☆512Oct 7, 2024Updated last year
- Extract and aggregate threat intelligence.☆906Jan 31, 2024Updated 2 years ago
- Map tracking ransomware, by OCD World Watch team☆485Feb 20, 2026Updated last week
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,055Dec 11, 2024Updated last year
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆756Feb 1, 2026Updated last month
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,821Nov 3, 2024Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,445Feb 24, 2026Updated last week