montysecurity / C2-TrackerLinks
Live Feed of C2 servers, tools, and botnets
☆726Updated last week
Alternatives and similar repositories for C2-Tracker
Users that are interested in C2-Tracker are comparing it to the libraries listed below
Sorting:
- Yet another Ransomware gang tracker☆534Updated last week
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆388Updated last week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆615Updated 3 months ago
- A resource containing all the tools each ransomware gangs uses☆1,280Updated 3 weeks ago
- A centralized and enhanced memory analysis platform☆509Updated 4 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆266Updated 2 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆722Updated 9 months ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆224Updated 2 months ago
- Awesome Security lists for SOC/CERT/CTI☆1,179Updated this week
- CLI tools for forensic investigation of Windows artifacts☆347Updated 3 months ago
- Map tracking ransomware, by OCD World Watch team☆479Updated 8 months ago
- Automatically created C2 Feeds☆652Updated last week
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆405Updated last year
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆402Updated this week
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆764Updated last week
- ☆541Updated 2 months ago
- A collection of phishing samples for researchers and detection developers.☆362Updated 2 weeks ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆741Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆412Updated last week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆717Updated 3 months ago
- ☆513Updated last year
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆605Updated this week
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆344Updated last month
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆686Updated 3 weeks ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆407Updated last year
- A curated list of Awesome Threat Intelligence Blogs☆463Updated last month
- Just some lists of Malware Configs☆173Updated 10 months ago
- Collection of forensic tools☆669Updated 6 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆267Updated 5 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆189Updated 10 months ago