Active Countermeasures Active Countermeasures
  • Home
  • AC-Hunter™
    • AC-Hunter™
    • Features
    • How It Works
    • Installation
    • Live Demo
    • Pricing
    • Partner Program
    • Brochure
    • Community Edition
  • Free Tools
    • BeaKer
    • espy
    • Passer
    • RITA
    • SMUDGE
    • Threat Simulator
    • zcutter
  • Education
    • Blog
    • Events
    • Webcasts
    • Fireside Fridays
    • Threat Hunt Training
    • Cyber Range
  • About
    • About Us
    • Partner Program
    • Sister Companies
    • Testimonials
  • Contact
    • Contact Us
    • Subscribe
    • Customer Login
LIVE DEMO

NAT and Packet Capture

June 12, 2025

Threat Hunting C2 over HTTPS Connections Using the TLS Certificate

May 29, 2025

Malware of the Day – C2 over ICMP (ICMP-GOSH)

May 15, 2025

The Beginner’s Guide to Command and Control Part 2 – The Role of C2 in Modern Threat Campaigns

May 1, 2025

Malware of the Day – C2 over NTP (goMESA)

April 17, 2025

The Beginner’s Guide to Command and Control Part 1 – How C2 Frameworks Operate

April 3, 2025

Threat Hunting a Telegram C2 Channel

March 20, 2025

Malware of the Day – IPv6 Address Aliasing

March 6, 2025

Measuring Data Jitter Using RCR

February 20, 2025

Malware of the Day – Merlin C2 Data Jitter

February 6, 2025

A Network Threat Hunter’s Guide to C2 over QUIC

January 23, 2025

Malware of the Day – Tunneling RDP with Microsoft Dev Tunnels

January 9, 2025

Posts pagination

1 2 … 18 Next
Active Countermeasures
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn

SUBSCRIBE

© Copyright 2025 - Active Countermeasures, Inc. All rights reserved.
  • Privacy Policy