imaginaryC2
Malware simulator
A tool to help analyze malware behavior by simulating network interactions and replaying captured responses.
Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.
443 stars
20 watching
69 forks
Language: Python
last commit: about 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
inguardians/toms_honeypot | A Python-based project simulating a decoy system to detect and analyze malicious activity in computer networks. | 26 |
fortiphyd/grficsv2 | A proof-of-concept simulation framework demonstrating industrial control system security vulnerabilities and attack scenarios | 403 |
jingconan/imalse | A framework to simulate and emulate malware behavior in a controlled environment. | 12 |
andresionek91/fake-web-events | Generates semi-random web events with configurable probabilities and constraints to mimic real-world scenarios. | 80 |
mandiant/speakeasy | Emulates specific components of the Windows operating system to analyze malware | 1,515 |
sea-erkin/log-snare | A web application designed to simulate vulnerabilities and demonstrate the importance of proper validation and logging. | 31 |
mandiant/reelphish | A tool designed to test the effectiveness of phishing defenses by simulating real-time two-factor phishing attacks. | 507 |
jmervine/httperfpy | A Python tool for simulating HTTP traffic and measuring network performance | 11 |
quii/mockingjay-server | Provides a tool to create fast-to-launch fake servers with configurable contracts and testing capabilities. | 562 |
fozavci/tehsat | A proof-of-concept tool designed to generate malware traffic for security incident detection and analysis. | 17 |
lorentzenman/sheepl | A tool that simulates realistic user behavior to support tradecraft development in lab environments | 392 |
provos/honeyd | A tool for creating and managing synthetic network hosts to simulate various network conditions and test security systems. | 11 |
project-dc/pygeneses | A PyTorch-based framework for training and studying artificial species in bio-inspired environments | 72 |
nccgroup/goatcasino | A platform for simulating and exploiting smart contract vulnerabilities in a controlled environment | 115 |
claroty/arya | A tool that generates custom-made files to trigger YARA rules and mimic malware behavior. | 239 |