Perkins-Fund / Malware-Bible
Free educational courses in reverse engineering, malware analysis, and programming
☆405Updated this week
Alternatives and similar repositories for Malware-Bible:
Users that are interested in Malware-Bible are comparing it to the libraries listed below
- ☆280Updated 5 months ago
- ☆108Updated 3 months ago
- Репозиторий содержит список вопросов по наступальной безопасности.☆310Updated 2 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆71Updated last month
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆139Updated 8 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆276Updated 2 years ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆345Updated 5 months ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆142Updated last week
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆173Updated last month
- Application Fuzzing: Tools, Techniques, and Best Practices☆161Updated 6 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆272Updated 9 months ago
- Набор инструментов для OSINT в VKontakte. Основано на материалах Rawrdcore☆171Updated last year
- A monster cheatsheet on MITM attacks☆342Updated last year
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆31Updated 4 months ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆86Updated 11 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆80Updated 3 months ago
- ☆127Updated 3 years ago
- 🔍 Search anyone's digital footprint across 300+ websites☆913Updated 3 weeks ago
- ☆60Updated 5 months ago
- A good selection of Privacy & Infosec tools that will help you understand more about how to protect your online privacy and security.☆121Updated 2 months ago
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆96Updated 2 months ago
- Browser Chrome extensions, to help with OSINT, OPSEC, Privacy & Obfuscation.☆302Updated last month
- Pure Malware Development Resource Collections☆242Updated 2 months ago
- Light-weight web security scanner☆150Updated 2 weeks ago
- Complete list of LPE exploits for Windows (starting from 2023)☆763Updated this week
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆581Updated last month
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆185Updated last month
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆47Updated 2 weeks ago
- Maltego Transforms for OSINT on Telegram Messenger☆222Updated 3 months ago
- In this repository you will find sample commands and test files for each day of the course "Linux for OSINT. A 21-day course for beginner…☆489Updated last year