Repository contains IP addresses of C2 infrastructure collected during malware analysis and hunting that hackers use to communicate and control after malware attack/post exploitation. This allows them to launch cyberattacks, steal personal data.
- Cobalt Strike
- Empire
- Metasploit Framework
- Mythic
- Posh
- Sliver
- XMRig Monero servers
- IPv4 address
- Passive DNS replication
- C2 Framework