Free educational courses in reverse engineering, malware analysis, and programming
☆475Aug 24, 2025Updated 6 months ago
Alternatives and similar repositories for Malware-Bible
Users that are interested in Malware-Bible are comparing it to the libraries listed below
Sorting:
- A CLI tool that bundles source code files into a single context for LLM prompts☆21Jan 9, 2025Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 10 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,317Nov 12, 2025Updated 3 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,319Updated this week
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,051Updated this week
- command control framework☆31Updated this week
- Our Tips&Tricks☆145Updated this week
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,447Oct 4, 2024Updated last year
- A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serve…☆614Jul 21, 2025Updated 7 months ago
- ClatScope Info Tool – The best and most versatile OSINT utility for retrieving geolocation, DNS, WHOIS, phone, email, data breach informa…☆1,400Nov 19, 2025Updated 3 months ago
- ☆72Jan 31, 2025Updated last year
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆128Dec 29, 2024Updated last year
- This is practice VM for malware development☆180Nov 17, 2025Updated 3 months ago
- Hacking Books☆1,780Nov 25, 2019Updated 6 years ago
- Cybersecurity oriented awesome list☆3,205Mar 1, 2026Updated last week
- chatbot made with gradio using opensource deepseek-r1 running locally☆313Jan 30, 2025Updated last year
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- ☆59Nov 13, 2024Updated last year
- Lab used for workshop and CTF☆500Feb 3, 2026Updated last month
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆76Oct 2, 2025Updated 5 months ago
- 💡 Raytracer with GUI editor☆18Jan 27, 2026Updated last month
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆282Oct 8, 2025Updated 5 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Dec 20, 2023Updated 2 years ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆354Apr 26, 2025Updated 10 months ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆494Feb 13, 2023Updated 3 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated 2 months ago
- This is a repository of resource about Malware techniques☆825Apr 8, 2023Updated 2 years ago
- ☆26Nov 25, 2025Updated 3 months ago
- A PowerShell console in C/C++ with all the security features disabled☆368Oct 14, 2025Updated 4 months ago
- ☆123Dec 17, 2024Updated last year
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆235Dec 15, 2021Updated 4 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆283Sep 26, 2024Updated last year
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆259Jan 29, 2026Updated last month
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆405Dec 20, 2025Updated 2 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Jul 29, 2025Updated 7 months ago