There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Repository Details
🦅 Use fingerprinting to actively hunt for Command and Control servers on Shodan. Process threat feeds from Abuse.ch services to create a local database of C2 servers.