C2IntelFeeds
C2 feeds
Automatically generated C2 feed data from Censys search results
Automatically created C2 Feeds
540 stars
30 watching
47 forks
Language: REXX
last commit: 2 months ago cobalt-strikecobaltstrikeempireindicators-of-compromiseiocsmetasploitposhc2threat-huntingthreat-intelligencethreatintel
Related projects:
Repository | Description | Stars |
---|---|---|
| Automates conversion of Cobalt Strike profiles to modrewrite scripts for HTTP C2 redirection | 585 |
| A collection of C2 profiles used in post-exploitation frameworks | 342 |
| A command line tool that generates randomized C2 malleable profiles for use in threat simulation and red teaming exercises. | 1,024 |
| A collection of pre-defined threat actor profiles used in Cobalt Strike | 771 |
| Generates random C2 profiles for testing and simulation | 631 |
| An implementation of Cobalt Strike's External C2 specification using .NET libraries | 84 |
| A comprehensive guide and reference project for designing Cobalt Strike Malleable C2 profiles | 1,631 |
| Analyzes logs from Cobalt and Empire to generate an Excel report on C2 activity, sessions, and credentials. | 20 |
| Converts HTTP requests from Burp Suite into a format compatible with Cobalt Strike Malleable C2 profiles. | 371 |
| A research project that creates a Cobalt Strike-compatible Notion profile to mimic the app's behavior and facilitate collaboration | 53 |
| A CobaltStrike External C2 for Websockets implemented in C++ | 194 |
| A C2 framework using BITS and direct syscalls to establish a covert communication channel | 215 |
| A Python framework for building data transfer interfaces between frameworks and Command and Control systems. | 228 |
| Provides example C2 stacks using Traefik for fronting malicious tools and services | 26 |
| An analysis project of Cobalt Strike C2 protocol in Python. | 67 |