Projects STRLCPY C2-Tracker Files
🤬
Revision indexing in progress... (search in this revision will be accurate after indexed)
Enable build support by adding .buildspec.yml
backup Loading last commit info...
data
.gitignore
README.md
autoupdate.sh
requirements.txt
tracker.py
README.md

C2 Tracker

This repo houses the code I made to mine various C2 IPs from Shodan. The searches used were sourced from Michael Koczwara's Research (see references below).

Current Metrics

  • Suspected C2 Servers: 2,641

    • Cobalt Strike: 1,757
    • Metaploit Framework: 603
    • Covenant: 33
    • Mythic: 55
    • Brute Ratel C4: 9
    • Posh C2: 9
  • (Those numbers don't add up so I suspect a few IPs are housing multiple C2s, see future state)

Current State

I currently have this script running nightly on a crontab and automatically updating the files in data. There is a backup of the data in backup, this is not touched by the automation and will occassionally be updated manually.

Last Backup: 11/24/2022

Running Locally

However if you want to host a private version, put your Shodan API key in an environment variable called SHODAN_API_KEY

echo SHODAN_API_KEY=API_KEY >> ~/.bashrc
bash
python3 -m pip install -r requirements.txt
python3 tracker.py

Future State

  • Write scripts to analyze DNS/WHOIS info
  • Build automation into the script
  • Write script to identify servers with multiple frameworks running
  • Track metrics over time

References

Please wait...
Page is in error, reload to recover