montysecurity/C2-Tracker

GitHub: montysecurity/C2-Tracker

基于Shodan搜索的免费社区驱动型C2和僵尸网络基础设施IOC情报源,每周更新并支持SIEM集成。

Stars: 751 | Forks: 74

# C2 Tracker C2 Tracker 是一个免费、社区驱动的 IOC 供源,它使用 [Shodan](https://www.shodan.io/) ~~和 [Censys](https://search.censys.io/)~~ 搜索来收集已知的恶意软件/僵尸网络/C2 基础设施的 IP 地址。 ## 特别致谢 许多查询来源于其他 CTI 研究人员: - [BushidoToken](https://twitter.com/BushidoToken) - [Michael Koczwara](https://twitter.com/MichalKoczwara) - [ViriBack](https://twitter.com/ViriBack) - [Gi7W0rm](https://twitter.com/Gi7w0rm) - [Glacius_](https://twitter.com/Glacius_) - [corumir](https://github.com/corumir) - [salmanvsf](https://x.com/salmanvsf) - [SecurityJosh](https://github.com/SecurityJosh) 非常感谢他们! 感谢 [BertJanCyber](https://twitter.com/BertJanCyber) 创建了用于摄入此供源的 [KQL query](https://github.com/Bert-JanP/Hunting-Queries-Detection-Rules/blob/main/Threat%20Hunting/TI%20Feed%20-%20MontySecurity%20C2%20Tracker%20All%20IPs.md) 最后,感谢 [Y_nexro](https://twitter.com/Y_NeXRo) 创建了 [C2Live](https://github.com/YoNixNeXRo/C2Live),用于可视化数据以及位于 [c2tracker.com](https://c2tracker.com) 的网站版本 ## 用法 最新的收集数据将存储在 `data/` 中。IP 按工具名称分类,还有一个包含所有 IP 的 `all.txt` 文件。目前该供源每周一更新。 ### 摄入/告警 - 如果你的 SIEM/EDR/TIP 能够从远程来源摄入数据,那么你可以使用原始文本格式的文件。请参阅上方 BertJanCyber 的 KQL 查询作为示例 - FortinetSIEM 7.2.0 增加了对该情报供源的支持 - `https://docs.fortinet.com/document/fortisiem/7.2.0/release-notes/553241/whats-new-in-7-2-0` ### 调查/历史分析 - 该仓库本质上具有版本控制功能。这意味着你可以搜索仓库的历史记录,查看某个 IP 何时出现在结果中。我曾使用我的另一个公开工具 [GitHub Repo OSINT Tool](https://github.com/montysecurity/GROT) 来实现此目的。 - 有一个针对此项目的 OpenCTI 连接器,可以在[这里](https://github.com/OpenCTI-Platform/connectors/tree/master/external-import/montysecurity-c2-tracker)找到 - 不建议在生产环境中使用 ## 我追踪什么? - C2's - [Cobalt Strike](https://www.cobaltstrike.com/) - [Metasploit Framework](https://www.metasploit.com/) - [Covenant](https://github.com/cobbr/Covenant) - [Mythic](https://github.com/its-a-feature/Mythic) - [Brute Ratel C4](https://bruteratel.com/) - [Posh](https://github.com/nettitude/PoshC2) - [Sliver](https://github.com/BishopFox/sliver) - [Deimos](https://github.com/DeimosC2/DeimosC2) - PANDA - [NimPlant C2](https://github.com/chvancooten/NimPlant) - [Havoc C2](https://github.com/HavocFramework/Havoc) - [Caldera](https://caldera.mitre.org/) - [Empire](https://github.com/EmpireProject/Empire) - [Ares](https://github.com/sweetsoftware/Ares) - [Hak5 Cloud C2](https://shop.hak5.org/products/c2) - [Pantegana](https://github.com/cassanof/pantegana) - [Supershell](https://github.com/tdragon6/Supershell/tree/main) - [Vshell](https://github.com/veo/vshell) - [Villain](https://github.com/t3l3machus/Villain) - [Nimplant C2](https://github.com/chvancooten/NimPlant) - [RedGuard C2](https://github.com/wikiZ/RedGuard/tree/main) - Oyster C2 - [byob C2](https://github.com/malwaredllc/byob) - Malware - AcidRain Stealer - Misha Stealer (AKA Grand Misha) - Patriot Stealer - RAXNET Bitcoin Stealer - Titan Stealer - Collector Stealer - [Mystic Stealer](https://twitter.com/_montysecurity/status/1643164749599834112) - [Gotham Stealer](https://twitter.com/FalconFeedsio/status/1705765083429863720) - [Meduza Stealer](https://twitter.com/g0njxa/status/1717563999984717991?t=rcVyVA2zwgJtHN5jz4wy7A&s=19) - Quasar RAT - ShadowPad - AsyncRAT - DcRat - BitRAT - DarkComet Trojan - XtremeRAT Trojan - NanoCore RAT Trojan - Gh0st RAT Trojan - DarkTrack RAT Trojan - njRAT Trojan - Remcos Pro RAT Trojan - Poison Ivy Trojan - Orcus RAT Trojan - ZeroAccess Trojan - HOOKBOT Trojan - [RisePro Stealer](https://github.com/noke6262/RisePro-Stealer) - NetBus Trojan - Bandit Stealer - Mint Stealer - Mekotio Trojan - Gozi Trojan - Atlandida Stealer - VenomRAT - Orcus RAT - BlackDolphin - Artemis RAT - Godzilla Loader - Jinx Loader - Netpune Loader - [SpyAgent](https://www.deepinstinct.com/blog/the-russian-spyagent-a-decade-later-and-rat-tools-remain-at-risk) - [SpiceRAT](https://hunt.io/blog/the-secret-ingredient-unearthing-suspected-spicerat-infrastructure-via-html-response) - Dust RAT - Pupy RAT - Atomic Stealer - Lumma Stealer - Serpent Stealer - Axile Stealer - Vector Stealer - Mint Stealer - Z3us Stealer - Rastro Stealer - Darkeye Stealer - Agniane Stealer - Epsilon Stealer - Bahamut Stealer - [Unam Web Panel](https://github.com/UnamSanctam/UnamWebPanel) / SilentCryptoMiner - Vidar Stealer - Kraken RAT - Bumblebee Loader - Viper RAT - Spectre Stealer - Sectop RAT - Tools - [XMRig Monero Cryptominer](https://xmrig.com/) - [GoPhish](https://getgophish.com/) - [Browser Exploitation Framework (BeEF)](https://github.com/beefproject/beef) - [BurpSuite](https://portswigger.net/burp) - [Hashcat](https://hashcat.net/hashcat/) - [MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) - [EvilGoPhish](https://github.com/fin3ss3g0d/evilgophish) - [EvilGinx](https://github.com/kgretzky/evilginx2) - Botnets - [7777](https://gi7w0rm.medium.com/the-curious-case-of-the-7777-botnet-86e3464c3ffd) - [BlackNET](https://github.com/suriya73/BlackNET) - Doxerina - Scarab - [63256](https://www.team-cymru.com/post/botnet-7777-are-you-betting-on-a-compromised-router) - Kaiji - MooBot - Mozi ## 本地运行 如果你想托管私有版本,请将你的 Shodan API 密钥放入名为 `SHODAN_API_KEY` 的环境变量中,并在 `CENSYS_API_ID` 和 `CENSYS_API_SECRET` 中配置你的 Censys 凭证 ``` python3 -m pip install -r requirements.txt python3 tracker.py ``` ## 贡献 如果你知道任何用于识别对手基础设施的额外 Shodan/Censys 搜索,我鼓励开启 Issue 或 PR。我不会设定严格的提交准则,但请记住,**精确度至关重要**(重点关注高真/假阳性比率)。 ## 参考 - [Hunting C2 with Shodan by Michael Koczwara](https://michaelkoczwara.medium.com/hunting-c2-with-shodan-223ca250d06f) - [Hunting Cobalt Strike C2 with Shodan by Michael Koczwara](https://michaelkoczwara.medium.com/cobalt-strike-c2-hunting-with-shodan-c448d501a6e2) - [https://twitter.com/MichalKoczwara/status/1591750513238118401?cxt=HHwWgsDUiZGqhJcsAAAA](https://twitter.com/MichalKoczwara/status/1591750513238118401?cxt=HHwWgsDUiZGqhJcsAAAA) - BushidoToken's [OSINT-SearchOperators](https://github.com/BushidoUK/OSINT-SearchOperators/blob/main/ShodanAdversaryInfa.md) - [https://twitter.com/MichalKoczwara/status/1641119242618650653](https://twitter.com/MichalKoczwara/status/1641119242618650653) - [https://twitter.com/MichalKoczwara/status/1641676761283850241](https://twitter.com/MichalKoczwara/status/1641676761283850241) - [https://twitter.com/_montysecurity/status/1643164749599834112](https://twitter.com/_montysecurity/status/1643164749599834112) - [https://twitter.com/ViriBack/status/1713714868564394336](https://twitter.com/ViriBack/status/1713714868564394336) - [https://gi7w0rm.medium.com/the-curious-case-of-the-7777-botnet-86e3464c3ffd](https://gi7w0rm.medium.com/the-curious-case-of-the-7777-botnet-86e3464c3ffd) - [https://twitter.com/Glacius_/status/1731699013873799209](https://twitter.com/Glacius_/status/1731699013873799209) - [https://www.team-cymru.com/post/botnet-7777-are-you-betting-on-a-compromised-router](https://www.team-cymru.com/post/botnet-7777-are-you-betting-on-a-compromised-router)
标签:AMSI绕过, Botnet, C2 Tracker, C2日志可视化, C2服务器, EDR, ESC4, IOC, IP地址, OSINT, 威胁情报, 威胁检测, 开发者工具, 恶意软件, 指纹识别, 攻击基础设施, 数据源, 网络安全, 脆弱性评估, 逆向工具, 隐私保护, 风险识别