Perkins-Fund / Malware-BibleView external linksLinks
Free educational courses in reverse engineering, malware analysis, and programming
☆475Aug 24, 2025Updated 5 months ago
Alternatives and similar repositories for Malware-Bible
Users that are interested in Malware-Bible are comparing it to the libraries listed below
Sorting:
- A CLI tool that bundles source code files into a single context for LLM prompts☆21Jan 9, 2025Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 9 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,301Nov 12, 2025Updated 3 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated 11 months ago
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,289Feb 1, 2026Updated 2 weeks ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,036Jan 11, 2026Updated last month
- Our Tips&Tricks☆128Feb 17, 2025Updated 11 months ago
- command control framework☆30Updated this week
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,438Oct 4, 2024Updated last year
- ClatScope Info Tool – The best and most versatile OSINT utility for retrieving geolocation, DNS, WHOIS, phone, email, data breach informa…☆1,345Nov 19, 2025Updated 2 months ago
- A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serve…☆607Jul 21, 2025Updated 6 months ago
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆128Dec 29, 2024Updated last year
- ☆72Jan 31, 2025Updated last year
- This is practice VM for malware development☆179Nov 17, 2025Updated 2 months ago
- Cybersecurity oriented awesome list☆3,044Feb 8, 2026Updated last week
- Hacking Books☆1,754Nov 25, 2019Updated 6 years ago
- chatbot made with gradio using opensource deepseek-r1 running locally☆314Jan 30, 2025Updated last year
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last week
- ☆59Nov 13, 2024Updated last year
- Lab used for workshop and CTF☆491Feb 3, 2026Updated last week
- A meta-list of public references to threat actor profiles and APT group datasets.☆75Oct 2, 2025Updated 4 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆126Dec 2, 2023Updated 2 years ago
- 💡 Raytracer with GUI editor☆18Jan 27, 2026Updated 2 weeks ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆279Oct 8, 2025Updated 4 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Dec 20, 2023Updated 2 years ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆355Apr 26, 2025Updated 9 months ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆490Feb 13, 2023Updated 3 years ago
- A PowerShell console in C/C++ with all the security features disabled☆342Oct 14, 2025Updated 4 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated last month
- This is a repository of resource about Malware techniques☆821Apr 8, 2023Updated 2 years ago
- ☆26Nov 25, 2025Updated 2 months ago
- ☆123Dec 17, 2024Updated last year
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆234Dec 15, 2021Updated 4 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆282Sep 26, 2024Updated last year
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆255Jan 29, 2026Updated 2 weeks ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆404Dec 20, 2025Updated last month
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Jul 29, 2025Updated 6 months ago