🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Framework #Server #Command #Control
📦 项目名称: fake-adobe-infostealer-analysis
👤 项目作者: thebinaryanalyst73-bit
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-14 19:00:30
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Framework #Server #Command #Control
📦 项目名称: fake-adobe-infostealer-analysis
👤 项目作者: thebinaryanalyst73-bit
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-14 19:00:30
📝 项目描述:
Forensic analysis of an infostealer distributed via a fake Adobe installer, including full multi-stage infection chain and active C2 validation.🔗 点击访问项目地址
GitHub
GitHub - thebinaryanalyst73-bit/fake-adobe-infostealer-analysis: Forensic analysis of an infostealer distributed via a fake Adobe…
Forensic analysis of an infostealer distributed via a fake Adobe installer, including full multi-stage infection chain and active C2 validation. - thebinaryanalyst73-bit/fake-adobe-infostealer-anal...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server
📦 项目名称: Malware-Traffic-Analysis-Incident-Response
👤 项目作者: shraddhhaapokharell
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 20:01:55
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server
📦 项目名称: Malware-Traffic-Analysis-Incident-Response
👤 项目作者: shraddhhaapokharell
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-15 20:01:55
📝 项目描述:
Wireshark analysis of real malware PCAP identifying C2 server and encoded beaconing traffic🔗 点击访问项目地址
GitHub
GitHub - shraddhhaapokharell/Malware-Traffic-Analysis-Incident-Response: Wireshark analysis of real malware PCAP identifying C2…
Wireshark analysis of real malware PCAP identifying C2 server and encoded beaconing traffic - shraddhhaapokharell/Malware-Traffic-Analysis-Incident-Response
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server #Command #Control
📦 项目名称: forge-c2-go
👤 项目作者: wezzels
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-16 02:59:48
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server #Command #Control
📦 项目名称: forge-c2-go
👤 项目作者: wezzels
🛠 开发语言: TypeScript
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-16 02:59:48
📝 项目描述:
this was a project to make as many tests and verifications for the old Raytheon forge project. 🔗 点击访问项目地址
GitHub
GitHub - wezzels/forge-c2-go: this was a project to make as many tests and verifications for the old Raytheon forge project.
this was a project to make as many tests and verifications for the old Raytheon forge project. - wezzels/forge-c2-go
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Framework #Server #Client #Command #Control
📦 项目名称: Android-Projector-C2-Malware
👤 项目作者: Kavan00
🛠 开发语言: None
⭐ Star数量: 13 | 🍴 Fork数量: 1
📅 更新时间: 2026-04-16 23:02:05
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Framework #Server #Client #Command #Control
📦 项目名称: Android-Projector-C2-Malware
👤 项目作者: Kavan00
🛠 开发语言: None
⭐ Star数量: 13 | 🍴 Fork数量: 1
📅 更新时间: 2026-04-16 23:02:05
📝 项目描述:
Breakdown of a c2-network of chinese beamers - SilentSDK-Analysis🔗 点击访问项目地址
GitHub
GitHub - Kavan00/Android-Projector-C2-Malware: Breakdown of a c2-network of chinese beamers - SilentSDK-Analysis
Breakdown of a c2-network of chinese beamers - SilentSDK-Analysis - Kavan00/Android-Projector-C2-Malware
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server
📦 项目名称: c2
👤 项目作者: iuriguilherme
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-17 00:01:27
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server
📦 项目名称: c2
👤 项目作者: iuriguilherme
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-17 00:01:27
📝 项目描述:
AGI - Agent-driven Genetic-simulated Individual-organisms🔗 点击访问项目地址
GitHub
GitHub - iuriguilherme/c2: AGI - Agent-driven Genetic-simulated Individual-organisms
AGI - Agent-driven Genetic-simulated Individual-organisms - iuriguilherme/c2
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server
📦 项目名称: L2C2-Study-Server
👤 项目作者: deavers
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-17 21:02:11
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server
📦 项目名称: L2C2-Study-Server
👤 项目作者: deavers
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-17 21:02:11
📝 项目描述:
Experimental minimal Lineage 2 C2 login/game server emulator written in C++ for educational purposes (OS / networking / reverse engineering).🔗 点击访问项目地址
GitHub
GitHub - deavers/L2C2-Study-Server: Experimental minimal Lineage 2 C2 login/game server emulator written in C++ for educational…
Experimental minimal Lineage 2 C2 login/game server emulator written in C++ for educational purposes (OS / networking / reverse engineering). - deavers/L2C2-Study-Server
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Framework #Server #Client #Command #Control
📦 项目名称: Red-Cell-C2
👤 项目作者: WoodenshoeNL
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 05:01:33
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Framework #Server #Client #Command #Control
📦 项目名称: Red-Cell-C2
👤 项目作者: WoodenshoeNL
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 05:01:33
📝 项目描述:
无描述🔗 点击访问项目地址
GitHub
GitHub - WoodenshoeNL/Red-Cell-C2
Contribute to WoodenshoeNL/Red-Cell-C2 development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server #Control
📦 项目名称: windows-telegram-bot
👤 项目作者: vk-candpython
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 09:00:50
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server #Control
📦 项目名称: windows-telegram-bot
👤 项目作者: vk-candpython
🛠 开发语言: Python
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 09:00:50
📝 项目描述:
Advanced Windows C2 Administration Bot. Professional tool for remote workstation management via Telegram. Features stealthy persistence, secure session authentication, encrypted file transfer, and full terminal access.🔗 点击访问项目地址
GitHub
GitHub - vk-candpython/windows-telegram-bot: Advanced Windows C2 Administration Bot. Professional tool for remote workstation management…
Advanced Windows C2 Administration Bot. Professional tool for remote workstation management via Telegram. Features stealthy persistence, secure session authentication, encrypted file transfer, and ...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #C2 #Server #Command #Control
📦 项目名称: infostealer
👤 项目作者: RiadhBenlamine
🛠 开发语言: C++
⭐ Star数量: 12 | 🍴 Fork数量: 4
📅 更新时间: 2026-04-18 17:02:24
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #C2 #Server #Command #Control
📦 项目名称: infostealer
👤 项目作者: RiadhBenlamine
🛠 开发语言: C++
⭐ Star数量: 12 | 🍴 Fork数量: 4
📅 更新时间: 2026-04-18 17:02:24
📝 项目描述:
InfoStealer is a Proof-of-Concept (PoC) application designed to stealthily extract credentials from various web browsers and send them to a Command and Control (C2) server. As of 30/06/2024, this tool is fully undetectable by common antivirus software🔗 点击访问项目地址
GitHub
GitHub - RiadhBenlamine/infostealer: InfoStealer is a Proof-of-Concept (PoC) application designed to stealthily extract credentials…
InfoStealer is a Proof-of-Concept (PoC) application designed to stealthily extract credentials from various web browsers and send them to a Command and Control (C2) server. As of 30/06/2024, this t...