Free educational courses in reverse engineering, malware analysis, and programming
☆477Aug 24, 2025Updated 7 months ago
Alternatives and similar repositories for Malware-Bible
Users that are interested in Malware-Bible are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 10 months ago
- This is practice VM for malware development☆180Nov 17, 2025Updated 4 months ago
- A CLI tool that bundles source code files into a single context for LLM prompts☆21Jan 9, 2025Updated last year
- ☆72Updated this week
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆128Dec 29, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,349Mar 4, 2026Updated 3 weeks ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated last year
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,452Oct 4, 2024Updated last year
- ClatScope Info Tool – The best and most versatile OSINT utility for retrieving geolocation, DNS, WHOIS, phone, email, data breach informa…☆1,425Nov 19, 2025Updated 4 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,334Nov 12, 2025Updated 4 months ago
- Hacking Books☆1,801Nov 25, 2019Updated 6 years ago
- Cybersecurity oriented awesome list☆3,398Updated this week
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,059Mar 10, 2026Updated 2 weeks ago
- A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serve…☆618Jul 21, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- chatbot made with gradio using opensource deepseek-r1 running locally☆313Jan 30, 2025Updated last year
- Our Tips&Tricks☆148Mar 4, 2026Updated 3 weeks ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆106Nov 2, 2025Updated 4 months ago
- command control framework☆33Updated this week
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆284Oct 8, 2025Updated 5 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- find dll base addresses without PEB WALK☆162Jul 13, 2025Updated 8 months ago
- ☆156Apr 23, 2025Updated 11 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A meta-list of public references to threat actor profiles and APT group datasets.☆76Oct 2, 2025Updated 5 months ago
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆378Oct 14, 2025Updated 5 months ago
- This is a repository of resource about Malware techniques☆825Apr 8, 2023Updated 2 years ago
- Hardcore Debugging☆938Jan 6, 2026Updated 2 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆338Feb 27, 2026Updated last month
- ☆335Sep 21, 2025Updated 6 months ago
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆237Dec 15, 2021Updated 4 years ago
- Nameless C2 - A C2 with all its components written in Rust☆285Sep 26, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Tool designed to exfiltrate OneDrive Business OCR Data☆127Jan 27, 2025Updated last year
- Collection of Notes and CheatSheets used for Red teaming Certs☆497Feb 13, 2023Updated 3 years ago
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- Lab used for workshop and CTF☆509Feb 3, 2026Updated last month
- Conference presentation slides☆2,378Nov 15, 2025Updated 4 months ago
- FBI Watchdog is a multi-layered domain monitoring tool that detects law enforcement seizures, DNS changes, HTTP fingerprint shifts, WHOIS…☆587Mar 17, 2026Updated last week
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆306Mar 22, 2026Updated last week