imaginaryC2
Malware simulator
A tool to help analyze malware behavior by simulating network interactions and replaying captured responses.
Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.
445 stars
20 watching
68 forks
Language: Python
last commit: over 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A Python-based project simulating a decoy system to detect and analyze malicious activity in computer networks. | 26 |
| A proof-of-concept simulation framework demonstrating industrial control system security vulnerabilities and attack scenarios | 409 |
| A framework to simulate and emulate malware behavior in a controlled environment. | 13 |
| Generates semi-random web events with configurable probabilities and constraints to mimic real-world scenarios. | 80 |
| Emulates specific components of the Windows operating system to analyze malware | 1,538 |
| A web application designed to simulate vulnerabilities and demonstrate the importance of proper validation and logging. | 31 |
| A tool designed to test the effectiveness of phishing defenses by simulating real-time two-factor phishing attacks. | 509 |
| A Python tool for simulating HTTP traffic and measuring network performance | 11 |
| Provides a tool to create fast-to-launch fake servers with configurable contracts and testing capabilities. | 560 |
| A proof-of-concept tool designed to generate malware traffic for security incident detection and analysis. | 17 |
| A tool that simulates realistic user behavior to support tradecraft development in lab environments | 393 |
| A tool for creating and managing synthetic network hosts to simulate various network conditions and test security systems. | 11 |
| A PyTorch-based framework for training and studying artificial species in bio-inspired environments | 72 |
| A platform for simulating and exploiting smart contract vulnerabilities in a controlled environment | 116 |
| A tool that generates custom-made files to trigger YARA rules and mimic malware behavior. | 242 |