#c2 — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #c2, aggregated by home.social.
-
Another Telegram (Mobile) based Command and Control Demonstration (Featuring TeleTunnel v2)
-
Python C2 Server for Red Teaming: A Comprehensive Hands-On Guide
In this guide, I walk through building a Python-based C2 server, covering its architecture, encrypted communication, and real-world operational workflow.
https://denizhalil.com/2025/12/15/python-c2-server-red-teaming-guide/#CyberSecurity #RedTeam #C2 #commandandcontrol #Python #offensivesecurity #Pentesting #infosec #threatdetection #blueteam #securityengineering #ethicalhacking
-
Una vegada acabada l’experiència prova #C2 de català, aquí van les meves impressions:
Val la pena consultar a l’organisme a través del qual et vas inscriure quin model de prova fan servir. Jo ho vaig demanar on no tocava i vaig acabar estudiant amb un model més fàcil i més curt. -
Как я собрал себе C2 на малинке за один вечер
Давно хотел поднять свой C2-сервер. Ну, чтобы как большие мальчики с доменом, прокси, шифрованным туннелем. Но покупать VPS с 8GB RAM и платить за Cobalt Strike как‑то жирновато. Решил: будет малинка. ВНИМАНИЕ: Эта статья предназначена для ознакомления начинающим исследователям в области Кибербезопасности. Я не предоставляю инструкций по атакам на инфраструктуру. Я не буду тут показывать как обходить защиту windows и какие либо системы обнаружения угроз. Перед загрузкой вредоносного файла я отключил защиту в windows. Такая атака не сработает в боевых условиях это лишь материал для начального ознакомления!
https://habr.com/ru/articles/1024918/
#c2 #Command_control #пентест #кибербезопасность #обучение #развитие
-
France’s evolving battlefield doctrine increasingly reflects a network-centric warfare model, where platforms like a Hornet-class reconnaissance drone act as a forward ISR node, feeding real-time data into a broader #KillChain. In such a setup, the Hornet performs #Targeting and #TargetDesignation, rapidly identifying and geo-locating threats at the tactical edge.
This data is transmitted through #C2 systems, enabling assets like the #MQ9Reaper to assume control of the engagement cycle. The Reaper conducts #ISR, confirms the target (PID), and executes a #PrecisionStrike using #AGM114 #Hellfire missiles with #LaserGuidance.
The integration of low-level reconnaissance drones with high-end strike platforms significantly compresses the #SensorToShooter loop, enhancing #SituationalAwareness and reducing response time. This architecture enables efficient #CloseAirSupport, persistent surveillance, and immediate #BDA, making it a cornerstone of #ModernWarfare and #DroneWarfare.
-
France’s evolving battlefield doctrine increasingly reflects a network-centric warfare model, where platforms like a Hornet-class reconnaissance drone act as a forward ISR node, feeding real-time data into a broader #KillChain. In such a setup, the Hornet performs #Targeting and #TargetDesignation, rapidly identifying and geo-locating threats at the tactical edge.
This data is transmitted through #C2 systems, enabling assets like the #MQ9Reaper to assume control of the engagement cycle. The Reaper conducts #ISR, confirms the target (PID), and executes a #PrecisionStrike using #AGM114 #Hellfire missiles with #LaserGuidance.
The integration of low-level reconnaissance drones with high-end strike platforms significantly compresses the #SensorToShooter loop, enhancing #SituationalAwareness and reducing response time. This architecture enables efficient #CloseAirSupport, persistent surveillance, and immediate #BDA, making it a cornerstone of #ModernWarfare and #DroneWarfare.
-
-
-
-
-
live #darkcomet #C2 server
196.251.107[.]24:5552confirmed 2026-03-30
-
-
-
#C2 domain tree, 2026-03-15 to 2026-03-28
https://abjuri5t.github.io/SarlackLab/*.www[.]childreninachangingclimate[.]org
*.adept[.]uk[.]com
*.dianqi1[.]jiayongdianqi[.]xyz
*.dianqi2[.]jiayongdianqi[.]xyz
*.bj[.]baidubce[.]com -
A ver si alguien me puede explicar una duda que tengo.
Hace dos días recibí mi primera nómina como funcionario de carrera.
Y esto me llama la atención. Para el IRPF, me descuentan el sueldo bruto. Pero para las contingencias comunes y el mecanismo de equidad intergeneracional, ¿por qué me descuentan también las pagas extraordinarias prorrateadas? Porque dichas pagas no las recibo prorrateadas, al año tengo 14 pagas :blobcatthink:
-
-
-
live #darkcomet #C2 server
185.157.46[.]232:1604confirmed 2026-03-27
-
live #darkcomet #C2 server
78.189.159[.]88:4587confirmed 2026-03-27
-
-
-
-
-
-
-
-
-
-
-
-
-
Chapter 10 – picking up the ungoogled thread again with Sailfish OS
Some time in October I think it was I decided that it might well be a good time in world history to get hold of a reasonably secure and "smaller-tech" mobile phone in order to be a bit less dependent on the current major players. -
„Im Dezember (…) konnten in einem Prüfungsraum in Nordrhein-Westfalen zehn Personen festgestellt werden, die gerade dabei waren, die Prüfung unter falschen Personalien als "Stellvertreter" abzulegen.“
https://www.br.de/nachrichten/bayern/betrug-bei-deutsch-und-einbuergerungstests-fliegt-auf,VAj5nX6
#Sprachtest #Sprachniveau #B2 #C1 #C2 #NRW #Deutschtest #deutsch
-
-
-
-
-
A domain registration is more like a lease rather than a deed. You get the exclusive right to use a domain name for a fixed term, but if you miss renewal, someone else can swoop in. What's scary is that with dropcatch services, cybercriminals can automate monitoring of pending‑delete domains and fire off registrations the split‑second a name is deleted by the registry and becomes available again. Think hawks circling for high‑value prey. 🦅
That's what happened to fita[.]org, a popular website owned by the Federation of International Trade Associations (FITA) and referenced by many government bodies including the International Trade Administration (trade.gov). The domain now sits behind Cloudflare and functions as a command-and-control (C2) for the AsyncRAT malware. The actor controlling it also stood up these C2 endpoints:
90phutif[.]cc,90phutis[.]cc,90phutiv[.]cc,90phuttn[.]cc,xoilaclinkf[.]cc,xoilactivi[.]uk,xoilactivik[.]cc,xoilactivil[.]cc,xoilactivim[.]cc,xoilactivin[.]cc,xoilactivio[.]cc,xoilactivip[.]cc,xoilactiviq[.]cc,xoilactivir[.]cc,xoilactivis[.]cc,xoilactivit[.]cc,xoilactiviu[.]cc,xoilactiviv[.]cc,xoilactiviw[.]cc,xoilactivix[.]cc,xoilactiviy[.]cc,xoilactiviz[.]cc,xoilacvnnc[.]tv,xoilacvnnf[.]tv,xoilacvzb[.]cc,xoilacvzc[.]cc,xoilacvze[.]cc,xoilacvzi[.]cc,xoilacvzk[.]cc,xoilacvzn[.]cc,xoilacvzp[.]cc,xoilacvzq[.]cc,xoilacvzz[.]cc,xoilacyys[.]cc,xoilaczc[.]mobi,xoilaczzbb[.]cc,xoilaczzczz[.]tv,xoilaczzdd[.]cc,xoilaczzdzz[.]tv,xoilaczziz[.]tv,xoilaczzszz[.]tv,xoilaczzvzz[.]tv
So make sure to set auto pay for any valuable domains you possess 💳 otherwise you could risk losing them. Proactive IT governance is also part of security.
#InfobloxThreatIntel #dns #async #threatintel #threatintelligence #infosec #cybersecurity #cybercrime #infoblox #rat #asyncrat #malware #dropcatch #domain #cloudflare #remoteaccesstrojan #infostealer #c2
-
-
@censys published a blog post on #NoName057(16) and their rotation through #DDoSia #C2 servers. I am a bit surprised that Censys did not join the party to track DDoSia until mid 2025, but I am glad they started to do so nonetheless. What I am missing is, what of the 3-layered architecture the authors are tracking.
-
An awesome guest post: Botnets Never Die on the creativity of #malware developers to be found at #APNIC. It covers details to the #AisuruBotnet, The #AIRASHIBotnet, and how their #C2 communication #protocol works.
Apparnetly, the heartbeat is a client sending
catto the C2 server, and the server responds withmeow. Fun and creative. -
-
Update:
Our velociraptor plugin `Windows.Memory.Mem2Disk` can detect RAM injections and fileless malware.
We tested it against (among others) the C2 frameworks Sliver, Havoc and Mythic. All three were detected.
It was recently featured in a blog post by Mike Cohen:
https://docs.velociraptor.app/blog/2025/2025-11-15-memory-analysis-pt1
Stay tuned for memory analysis with velo part 2!
#C2 #detection #memoryforensics #velociraptor #DFIR #cybersecurity #infosec #pwr2
-
-