Skip to content

Latest commit

 

History

History
20 lines (15 loc) · 619 Bytes

README.md

File metadata and controls

20 lines (15 loc) · 619 Bytes
Screenshot 2024-06-12 at 4 56 08 PM

Repository contains IP addresses of C2 infrastructure collected during malware analysis and hunting that hackers use to communicate and control after malware attack/post exploitation. This allows them to launch cyberattacks, steal personal data.

C2 Frameworks:

  • Cobalt Strike
  • Empire
  • Metasploit Framework
  • Mythic
  • Posh
  • Sliver
  • XMRig Monero servers

JSON file contains:

  • IPv4 address
  • Passive DNS replication
  • C2 Framework