Live Feed of C2 servers, tools, and botnets
☆756Mar 16, 2026Updated last week
Alternatives and similar repositories for C2-Tracker
Users that are interested in C2-Tracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Track C2 servers, tools, and botnets over time by framework and location☆43Feb 9, 2025Updated last year
- Automatically created C2 Feeds☆667Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆787Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆648Aug 4, 2025Updated 7 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- A resource containing all the tools each ransomware gangs uses☆1,329Updated this week
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- A curated list of Awesome Threat Intelligence Blogs☆515Feb 16, 2026Updated last month
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆117Oct 29, 2024Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆818Mar 6, 2026Updated 2 weeks ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,653Mar 11, 2026Updated last week
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,698Updated this week
- Awesome Security lists for SOC/CERT/CTI☆1,287Updated this week
- Interesting APT Report Collection And Some Special IOCs☆2,955Updated this week
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆640Updated this week
- ☆569Mar 28, 2024Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆195Dec 20, 2024Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,931Jan 20, 2026Updated 2 months ago
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆120Sep 17, 2025Updated 6 months ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,661Mar 9, 2026Updated 2 weeks ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆181May 27, 2025Updated 9 months ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆710Apr 21, 2025Updated 11 months ago
- Yet another Ransomware gang tracker☆565Mar 12, 2026Updated last week
- Map tracking ransomware, by OCD World Watch team☆486Feb 20, 2026Updated last month
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,062Feb 24, 2026Updated 3 weeks ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆393Apr 3, 2024Updated last year
- ☆512Oct 7, 2024Updated last year
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,405Nov 7, 2024Updated last year
- Extract and aggregate threat intelligence.☆908Jan 31, 2024Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Mar 14, 2026Updated last week
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Welcome to the SEKOIA.IO Community repository!☆180Mar 9, 2026Updated 2 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,059Mar 10, 2026Updated last week
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year