![Screenshot 2024-06-12 at 4 56 08 PM](https://private-user-images.githubusercontent.com/5883738/338999099-c776207e-5860-4bf2-abb8-a9d2bb72a083.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3MjEyNzkzMzQsIm5iZiI6MTcyMTI3OTAzNCwicGF0aCI6Ii81ODgzNzM4LzMzODk5OTA5OS1jNzc2MjA3ZS01ODYwLTRiZjItYWJiOC1hOWQyYmI3MmEwODMucG5nP1gtQW16LUFsZ29yaXRobT1BV1M0LUhNQUMtU0hBMjU2JlgtQW16LUNyZWRlbnRpYWw9QUtJQVZDT0RZTFNBNTNQUUs0WkElMkYyMDI0MDcxOCUyRnVzLWVhc3QtMSUyRnMzJTJGYXdzNF9yZXF1ZXN0JlgtQW16LURhdGU9MjAyNDA3MThUMDUwMzU0WiZYLUFtei1FeHBpcmVzPTMwMCZYLUFtei1TaWduYXR1cmU9MjE5MTljMjVlOGRmZTEzYjdlN2JlMjI3YTgzMjA0YmFhNTAwOGQ3ZTNjODlkZjMyNGY0MTA0NDdlZDI1ZGUxYSZYLUFtei1TaWduZWRIZWFkZXJzPWhvc3QmYWN0b3JfaWQ9MCZrZXlfaWQ9MCZyZXBvX2lkPTAifQ.9GOCZgiYAuxfDj1rtOlJwR1e0i3cUY0ZkAhzxSMAwM4)
Repository contains IP addresses of C2 infrastructure collected during malware analysis and hunting that hackers use to communicate and control after malware attack/post exploitation. This allows them to launch cyberattacks, steal personal data.
- Cobalt Strike
- Empire
- Metasploit Framework
- Mythic
- Posh
- Sliver
- XMRig Monero servers
- IPv4 address
- Passive DNS replication
- C2 Framework