Free educational courses in cybersecurity, reverse engineering, malware analysis, and programming designed to expand access, build practical skills, and support the next generation of cyber defenders.
☆483Apr 26, 2026Updated last week
Alternatives and similar repositories for Malware-Bible
Users that are interested in Malware-Bible are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated last year
- This is practice VM for malware development☆180Nov 17, 2025Updated 5 months ago
- A CLI tool that bundles source code files into a single context for LLM prompts☆21Jan 9, 2025Updated last year
- ☆77Mar 28, 2026Updated last month
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆127Dec 29, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,482Updated this week
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Feb 20, 2025Updated last year
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,466Oct 4, 2024Updated last year
- ClatScope Info Tool – The best and most versatile OSINT utility for retrieving geolocation, DNS, WHOIS, phone, email, data breach informa…☆1,464Nov 19, 2025Updated 5 months ago
- A self-hosted sandbox for red teams to test payloads against modern detection before deployment. MCP integration lets an LLM agent drive …☆1,412Updated this week
- Hacking Books☆1,847Nov 25, 2019Updated 6 years ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,075Apr 27, 2026Updated last week
- Cybersecurity oriented awesome list☆3,647May 2, 2026Updated last week
- A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serve…☆625Jul 21, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- chatbot made with gradio using opensource deepseek-r1 running locally☆314Jan 30, 2025Updated last year
- Our Tips&Tricks☆150Mar 4, 2026Updated 2 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆107Nov 2, 2025Updated 6 months ago
- command control framework☆33Apr 29, 2026Updated last week
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆291Updated this week
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 3 months ago
- find dll base addresses without PEB WALK☆163Jul 13, 2025Updated 9 months ago
- ☆156Apr 23, 2025Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆131Dec 2, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A meta-list of public references to threat actor profiles and APT group datasets.☆80Oct 2, 2025Updated 7 months ago
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆386Oct 14, 2025Updated 6 months ago
- This is a repository of resource about Malware techniques☆859Apr 8, 2023Updated 3 years ago
- Hardcore Debugging☆938Apr 9, 2026Updated last month
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆341Feb 27, 2026Updated 2 months ago
- ☆336Sep 21, 2025Updated 7 months ago
- Nameless C2 - A C2 with all its components written in Rust☆285Sep 26, 2024Updated last year
- Collection of Notes and CheatSheets used for Red teaming Certs☆497Feb 13, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tool designed to exfiltrate OneDrive Business OCR Data☆127Jan 27, 2025Updated last year
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆246Dec 15, 2021Updated 4 years ago
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- Conference presentation slides☆2,377Nov 15, 2025Updated 5 months ago
- Lab used for workshop and CTF☆515Feb 3, 2026Updated 3 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆324Apr 22, 2026Updated 2 weeks ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆362Mar 17, 2026Updated last month