drb-ra/C2IntelFeeds
GitHub: drb-ra/C2IntelFeeds
基于 Censys 扫描数据自动生成的 C2 威胁情报订阅源,提供多种格式的 IP、域名和配置元数据。
Stars: 666 | Forks: 55
# C2IntelFeeds
自动创建的 C2 订阅源 | 也通过 [@drb_ra](https://twitter.com/drb_ra) 发布
**如果没有 Censys 提供的源/原始数据,这是不可能实现的** - https://censys.io/
**C2IntelFeeds** 是一系列自动生成的 **命令与控制 (C2) 威胁情报订阅源** 的集合,源自大规模互联网扫描数据(主要是 Censys)。
这些订阅源旨在供 **防御者** 使用,适用于:
- 威胁追踪
- 网络监控
- 检测工程
- IOC 丰富
- 防御性阻断或告警
该项目专注于识别 **真实的 C2 基础设施**,而非恶意软件样本。
## 🔍 本仓库提供的内容
本仓库包含多个列出疑似或已确认 C2 基础设施的 **纯文本、CSV 和 JSON 订阅源**,包括:
- C2 IP 地址
- C2 域名和主机名
- 包含 C2 URL 路径的域名
- IP + 端口组合
- C2 配置元数据(如果可用)
订阅源会自动更新,主要反映 **近期活动**。
## ⏱️ 时间窗口
大多数订阅源提供两个时间范围:
- **7 天订阅源**(默认)
- **30 天订阅源**(历史背景)
- **90 天订阅源**(长期背景)
时间窗口指的是 **最后一次观察到的活动**,而非创建日期。
## 📁 订阅源类型
### ✅ 已验证订阅源(首选)
这些订阅源经过了额外的验证,并 **排除了已知的良性基础设施**。
| Feed | Description |
|----|----|
| **C2 IPs** | 已验证的 C2 服务器 IP 地址 |
| **C2 Domains** | 从已知 C2 植入程序中提取的域名 |
| **C2 Domains (Filtered)** | 同上,移除了高误报率的域名 |
| **C2 Domains + URL** | 包含特定 C2 URI 路径的域名 |
| **C2 Domains + URL + IP** | 域名、路径及解析出的 IP |
### ⚠️ 未验证订阅源
这些订阅源根据指纹匹配生成,但 **可能包含误报**。
| Feed | Description |
|----|----|
| **Unverified C2 IPs** | 基于扫描特征的可能 C2 IP |
| **Unverified C2 Domains** | 可能的 C2 域名 |
| **IP + Port Pairs** | 目标 IP 和端口组合 |
## 🧬 C2 配置数据
在可能的情况下,提取的 **C2 配置元数据** 包含在 CSV 和 JSON 格式中。
典型字段可能包括:
- 首次发现时间戳
- 真实 C2 IP(实际监听器)
- 端口、抖动、休眠时间
- ASN 和网络信息
- HTTP 主机头
- TLS 证书数据
- User-agent 字符串
- 可选公钥(JSON)
可能提供 **标准** 和 **30 天** 两种变体。
## 🛰️ 数据是如何生成的
订阅源是使用 **Censys 搜索查询** 构建的,旨在通过指纹识别检测已知的 C2 框架:
- TLS 证书字段
- JARM 指纹
- HTTP 响应头和标题
- Body 哈希
- 服务 Banner
- 已知植入程序特征
# Censys 搜索
| Tool | ```Censys Search```|
|------|:------------|
|[Sliver](https://github.com/BishopFox/sliver) |`(services.tls.certificates.leaf_data.subject.common_name="multiplayer" and same_service(services.jarm.fingerprint= 00000000000000000043d43d00043de2a97eabb398317329f027c66e4c1b01 and NOT services.port=31337 )) OR (services.banner_hashes="sha256:1f25c454ae331c582fbdb7af8a9839785a795b06a6649d92484b79565f7174ae" and services.jarm.fingerprint=3fd21b20d00000021c43d21b21b43d41226dd5dfc615dd4a96265559485910) OR same_service(services.tls.certificates.leaf_data.pubkey_bit_size: 2048 and services.tls.certificates.leaf_data.subject.organization: /(ACME\|Partners\|Tech\|Cloud\|Synergy\|Test\|Debug)? ?(co\|llc\|inc\|corp\|ltd)?/ and services.jarm.fingerprint: 3fd21b20d00000021c43d21b21b43d41226dd5dfc615dd4a96265559485910 and services.tls.certificates.leaf_data.subject.country: US and services.tls.certificates.leaf_data.subject.postal_code: /<1001-9999>/)`|
|[Covenant](https://github.com/cobbr/Covenant) |`same_service(services.tls.certificates.leaf_data.subject_dn="CN=Covenant" AND services.tls.certificates.leaf_data.issuer_dn="CN=Covenant") OR (services.software.product="Kestrel web server" AND services.http.response.html_title="Covenant")`|
|[Brute Ratel C4](https://bruteratel.com) |`services.http.response.body_hash="sha1:1a279f5df4103743b823ec2a6a08436fdf63fe30" OR same_service(services.http.response.body_hash="sha1:bc3023b36063a7681db24681472b54fa11f0d4ec" and services.jarm.fingerprint="3fd21b20d00000021c43d21b21b43de0a012c76cf078b8d06f4620c2286f5e")`|
|[Mythic](https://github.com/its-a-feature/Mythic) |`same_service(services.tls.certificates.leaf_data.subject_dn="O=Mythic" AND services.http.response.html_title="Mythic") OR services.banner_hashes="sha256:fb8b5d212f449a8ba61ab9ed9b44853315c33d12a07f8ce4642892750e251530" OR services.http.response.favicons.md5_hash="6be63470c32ef458926abb198356006c"`|
|[Deimos](https://github.com/DeimosC2/DeimosC2)|`services.jarm.fingerprint: "00000000000000000041d00000041d9535d5979f591ae8e547c5e5743e5b64" OR same_service(services.banner_hashes="sha256:38ea755e162c55ef70f9506dddfd01641fc838926af9c43eda652da63c67058b" and services.http.response.body_hashes="sha1:04ca7e137e1e9feead96a7df45bb67d5ab3de190" and services.tls.certificates.leaf_data.subject_dn="O=Acme Co" and services.tls.certificates.leaf_data.issuer_dn="O=Acme Co" and not services.tls.certificates.leaf_data.names="127.0.0.1:3000")`|
|[Nighthawk C2](https://www.mdsec.co.uk/nighthawk/) |`same_service(services.banner="HTTP/1.1 404 Not Found\r\nDate: \r\nX-Test: 2\r\nServer: Apache\r\nContent-Length: 20\r\n" and services.http.response.body_hashes="sha256:d872e8e4176213ea84ebc76d8fb621c31b4ca116fd0a51258813e804fe110ca4")`|
|Bianlian Go Trojan |`same_service(services.tls.certificates.leaf_data.subject_dn=/C=[0-9a-zA-Z]{16}, O=[0-9a-zA-Z]{16}, OU=[0-9a-zA-Z]{16}/ AND services.tls.certificates.leaf_data.issuer_dn=/C=[0-9a-zA-Z]{16}, O=[0-9a-zA-Z]{16}, OU=[0-9a-zA-Z]{16}/)`|
|[Havoc](https://github.com/HavocFramework/Havoc) |`same_service(services.tls.certificates.leaf_data.issuer.organization=/(Acme\|ACME\|acme\|Partners\|PARTNERS\|partners\|Tech\|TECH\|tech\|Cloud\|CLOUD\|cloud\|Synergy\|SYNERGY\|synergy\|Test\|TEST\|test\|Debug\|DEBUG\|debug)? ?(Co\|CO\|co\|Llc\|LLC\|llc\|Inc\|INC\|inc\|Corp\|CORP\|corp\|Ltd\|LTD\|ltd)?/ AND services.tls.certificates.leaf_data.issuer.country=US AND services.tls.certificates.leaf_data.issuer.postal_code=/[0-9]{4}/) OR services.http.response.headers.unknown.name: "X-Havoc" OR services.banner_hashes="sha256:f5a45c4aa478a7ba9b44654a929bddc2f6453cd8d6f37cd893dda47220ad9870"`|
|[Responder](https://github.com/lgandx/Responder) |`services.banner="HTTP/1.1 401 Unauthorized\r\nServer: Microsoft-IIS/7.5\r\nDate: \r\nContent-Type: text/html\r\nWWW-Authenticate: NTLM\r\nContent-Length: 0\r\n" OR services.banner_hashes="sha256:0fa31c8c34a370931d8ffe8097e998f778db63e2e036fbd7727a71a0dcf5d28c" OR services.smb.negotiation_log.server_guid="00000000000000000000000000000000ee85abf7eaf60c4f928192476deb76a9"`|
|[Pupy RAT](https://github.com/n1nj4sec/pupy)|`same_service(services.http.response.headers.Etag:"aa3939fc357723135870d5036b12a67097b03309" AND services.http.response.headers.Server="nginx/1.13.8") OR same_service(services.tls.certificates.leaf_data.issuer.organization:/[a-zA-Z]{10}/ AND services.tls.certificates.leaf_data.subject.organization:/[a-zA-Z]{10}/ AND services.tls.certificates.leaf_data.subject.organizational_unit="CONTROL")`|
|Qakbot|`same_service(services.jarm.fingerprint={"21d14d00021d21d21c42d43d0000007abc6200da92c2a1b69c0a56366cbe21","04d02d00004d04d04c04d02d04d04d9674c6b4e623ae36cc2d998e99e2262e"} AND services.http.response.body_hash="sha1:22e5446e82b3e46da34b5ebce6de5751664fb867") OR same_service(services.banner_hashes="sha256:5234096d7003929ad67037af6f5816933cab9e85f9b286468249ac9ab9bfb861" AND services.http.response.body_hash="sha1:22e5446e82b3e46da34b5ebce6de5751664fb867") OR (services.tls.certificates.leaf_data.subject_dn: /C=[A-Z]{2}, OU=([A-Z][a-z]{3,})( [A-Z][a-z]{3,}){0,2}, CN=[a-z]{4,12}\.[a-z]{2,4}/ and not services.tls.certificates.leaf_data.subject_dn:"OU=Domain Control Validated")`|
|[DcRat](https://github.com/qwqdanchun/DcRat)|`services.tls.certificates.leaf_data.issuer_dn="CN=DcRat Server, OU=qwqdanchun, O=DcRat By qwqdanchun, L=SH, C=CN"`|
|Viper|`services.http.response.body_hashes="sha1:cd40dbcdae84b1c8606f29342066547069ed5a33" OR services.http.response.favicons.md5_hash="a7469955bff5e489d2270d9b389064e1"`|
|[Supershell](https://github.com/tdragon6/Supershell/)|`services.http.response.html_title="Supershell - 登录" OR services.http.response.body_hashes="sha256:21ecc71669486c5b874b1be3b9c341133e83939fdbeefa2080df1b1703c4928"`|
|Pikabot|`services: (tls.certificates.leaf_data.signature.self_signed: true and http.response.headers: (key: "Etag" and value.headers: '"3147526947+gzip"') and not tls.certificate.parsed.subject_dn: "emailAddress=") or services: (tls.certificates.leaf_data.signature.self_signed: true and tls.cipher_selected="TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" and tls.certificates.leaf_data.pubkey_bit_size=4096 and tls.certificates.leaf_data.issuer_dn: /C=[A-Z]{2}, ST=[A-Z]{2}, O=([A-Z][a-z]{2,})( [A-Z][a-z\.]{2,}){0,5}, OU=([A-Z][a-z]{2,})( [A-Z][a-z\.]{2,}){0,5}, L=([A-Z][a-z]{2,})( [A-Z][a-z]{2,}){0,2}, CN=.*/)`|
|Meduza Stealer|`services.http.response.html_title="Meduza Stealer" OR services.http.response.favicons.md5_hash="e7a2bb050f7ec5ec2ba405400170a27d"`|
|[Evilginx/EvilGoPhish](https://help.evilginx.com)|`services.software.product: {Evilginx, EvilGoPhish}`|
|Hookbot/Pegasus|`services.http.response.html_title="HOOKBOT PANEL" OR services.http.response.favicons.hashes="sha256:b13b77f0b3d95c1146394ea855d915f189d3ea374179755cfb2ac47bfc8f306c"`|
|[AsyncRAT](https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp)|`same_service(services.tls.certificates.leaf_data.issuer_dn="CN=AsyncRAT Server" and services.tls.certificates.leaf_data.subject_dn="CN=AsyncRAT Server")`|
|[Remcos](https://breakingsecurity.net/remcos/)|`same_service(services.tls.versions.ja4s="t130200_1301_234ea6891581" and services.tls.ja3s="eb1d94daa7e0344597e756a1fb6e7054" and services.tls.cipher_selected="TLS_AES_128_GCM_SHA256" and services.jarm.fingerprint: 00000000000000000041d41d0000001798d6156df422564fb9b667b7418e4c and services.service_name="UNKNOWN" and services.tls.certificates.leaf_data.issuer_dn="" and services.tls.certificates.leaf_data.subject_dn="")`|
|DanaBot|`[REDACTED]`|
|Rhysida Trojan|`[REDACTED]`|
|[Oyster Backdoor](https://www.rapid7.com/blog/post/2024/06/17/malvertising-campaign-leads-to-execution-of-oyster-backdoor/)|`[REDACTED]`|
|SocGholish|`[REDACTED]`|
|[NetSupport Manager RAT](https://www.netsupportmanager.com)|`services.http.response.headers.Server="NetSupport Gateway/*"`|
|[Geacon_Pro](https://github.com/testxxxzzz/geacon_pro)|`same_service(services.tls.certificates.leaf_data.subject_dn="C=KZ, ST=KZ, L=, O=NN Fern Sub, OU=NN Fern, CN=foren.zik" AND services.tls.certificates.leaf_data.issuer_dn="C=KZ, ST=KZ, L=, O=NN Fern Sub, OU=NN Fern, CN=foren.zik")`|
|[Hak5 Cloud C2](https://shop.hak5.org/products/c2)|`services.software.product: "cloud c2" and services.software.vendor="Hak5"`|
|[CHAOS](https://github.com/tiagorlampert/CHAOS)|`services.software.uniform_resource_identifier: "cpe:2.3:a:chaos:chaos:*:*:*:*:*:*:*:*"`|
|[Interactsh](https://github.com/projectdiscovery/interactsh)|`services.software.uniform_resource_identifier: "cpe:2.3:a:interactsh:interactsh:*:*:*:*:*:*:*:*"`|
|[Reverse SSH](https://github.com/NHAS/reverse_ssh)|`[REDACTED]`|
|[wstunnel](https://github.com/erebe/wstunnel)|`[REDACTED]`|
|[Ligolo-ng](https://github.com/nicocha30/ligolo-ng)|`[REDACTED]`|
|Ransomhub Python C2|`[REDACTED]`|
|[Pyramid](https://github.com/naksyn/Pyramid)|`[REDACTED]`|
|VPN Themed Phishing|`[REDACTED]`|
|StealC v2|`services.http.response.body_hashes="sha256:067b25c7c2e27041dc47a0a4564b56a6bbfdc41e5dd630dbf070fdada4dbff71"`|
|[AdaptixC2](https://github.com/Adaptix-Framework/AdaptixC2)|`[REDACTED]`|
|Matanbuchus|`[REDACTED]`|
|[Pywssocks](https://pypi.org/project/pywssocks/)|`[REDACTED]`|
## 🧹 误报消除
仓库包含一个排除文件:**exclusions.rex**
该文件移除了:
- 已知的 CDN/域前置服务
- 常见的共享主机提供商
- 频繁出现的良性基础设施
经过筛选的订阅源会自动应用这些排除规则。
## 🧠 如何使用这些订阅源
这些订阅源适用于:
- **SIEM 接入**(Splunk、Sentinel、Elastic 等)
- **EDR 丰富**
- **威胁追踪查询**
- **网络检测**
- **防火墙/代理监控**
- **IOC 关联管道**
特意以 **简单格式** 提供,以 ease 自动化。
对大多数用户来说,最容易使用的文件应该是 [C2 IPs](https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/IPC2s.csv)、[C2 Domains Filtered](https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/domainC2s-filter-abused.csv) 和 [Unverified C2 IPs](https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/unverified/IPC2s.csv) 或它们的 30 天版本。
## 🌐 VPN & 代理列表
单独的订阅源包括已知的:
- VPN 出口节点
- 住宅代理网络
这些有助于:
- 减少检测中的噪音
- 为出站流量添加上下文
- 识别基础设施滥用
## 📜 许可证
本项目采用以下许可:
**Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)**
- 需署名
- 仅限非商业用途
- 衍生作品需以相同方式共享
## ⚠️ 免责声明
这些订阅源 **按原样** 提供,用于防御和研究目的。
- 不保证准确性或完整性
- 基础设施可能已被入侵、错误归因或重新利用
- 在采取行动前务必进行验证
**如果您觉得这个项目有用,请注明来源。**

本作品采用 Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License 许可协议。

本作品采用 Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License 许可协议。
标签:C2服务器, Homebrew安装, HTTP/HTTPS抓包, IOC, IP黑名单, Radare2, TLS指纹, Unix, 云存储安全, 命令与控制, 域名黑名单, 威胁情报, 子域名暴力破解, 安全订阅源, 底层编程, 开发者工具, 态势感知, 恶意基础设施, 恶意软件, 数字足迹, 网络安全, 网络扫描, 自动化检测, 防御框架, 隐私保护