montysecurity / C2-TrackerLinks
Live Feed of C2 servers, tools, and botnets
☆662Updated last week
Alternatives and similar repositories for C2-Tracker
Users that are interested in C2-Tracker are comparing it to the libraries listed below
Sorting:
- A centralized and enhanced memory analysis platform☆464Updated last month
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆689Updated 4 months ago
- A resource containing all the tools each ransomware gangs uses☆1,055Updated 3 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆583Updated 2 months ago
- Yet another Ransomware gang tracker☆449Updated this week
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆365Updated last week
- Automatically created C2 Feeds☆620Updated this week
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆212Updated 3 weeks ago
- ☆516Updated 8 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆214Updated this week
- Awesome Security lists for SOC/CERT/CTI☆1,003Updated this week
- CLI tools for forensic investigation of Windows artifacts☆341Updated 7 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆317Updated last week
- Ransomware simulator written in Golang☆439Updated 2 years ago
- This repository contains Malicious Indicator of Compromise (IOC) data, which is vital for cybersecurity professionals to enhance threat d…☆96Updated this week
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆672Updated last month
- Map tracking ransomware, by OCD World Watch team☆468Updated 3 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆669Updated 3 months ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆568Updated this week
- ☆196Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 11 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆679Updated last week
- A collection of companies that disclose adversary TTPs after they have been breached