Perkins-Fund / Malware-BibleLinks
Free educational courses in reverse engineering, malware analysis, and programming
☆472Updated 4 months ago
Alternatives and similar repositories for Malware-Bible
Users that are interested in Malware-Bible are comparing it to the libraries listed below
Sorting:
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆334Updated 2 years ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆104Updated 2 months ago
- MITM Field Manual☆368Updated last week
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆185Updated last year
- Репозиторий содержит список вопросов по наступальной безопасности.☆354Updated 2 months ago
- ☆136Updated 4 years ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆177Updated last month
- 🔎 OSINT Maltego Transforms for investigating Telegram channels, groups, and users, including deanonymization via stickers, forwarded mes…☆407Updated 2 weeks ago
- ☆123Updated last year
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆105Updated last year
- ☆392Updated 7 months ago
- ☆26Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆497Updated 5 months ago
- Collection of knowledge about information security☆661Updated last month
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆425Updated last month
- A good selection of Privacy & Infosec tools that will help you understand more about how to protect your online privacy and security.☆131Updated last month
- Hackings style defence tricks☆56Updated 3 weeks ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆275Updated last year
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆40Updated last year
- Browser Chrome extensions, to help with OSINT, OPSEC, Privacy & Obfuscation.☆394Updated 2 months ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆185Updated 3 years ago
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆144Updated 2 years ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆29Updated last month
- In this repository you will find sample commands and test files for each day of the course "Linux for OSINT. A 21-day course for beginner…☆569Updated 2 weeks ago
- Methodology, links, tools for OSINT in different countries☆703Updated this week
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆455Updated last month
- Collection of forensic tools☆686Updated last week
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆273Updated 3 months ago
- Набор инструментов для OSINT в VKontakte. Основано на материалах Rawrdcore☆186Updated 2 years ago
- Payload for jpg file☆61Updated last year