Perkins-Fund / Malware-BibleLinks
Free educational courses in reverse engineering, malware analysis, and programming
☆452Updated last week
Alternatives and similar repositories for Malware-Bible
Users that are interested in Malware-Bible are comparing it to the libraries listed below
Sorting:
- Linux-based botnet builder designed for creating advanced botnet payloads.☆97Updated 2 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆295Updated 2 years ago
- A monster cheatsheet on MITM attacks☆362Updated 2 months ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆151Updated last year
- ☆134Updated 4 years ago
- Репозиторий содержит список вопросов по наступальной безопасности.☆343Updated last month
- ☆119Updated 7 months ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆97Updated last year
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆163Updated last week
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆365Updated this week
- Methodology, links, tools for OSINT in different countries☆589Updated last month
- Collection of knowledge about information security☆642Updated last month
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆21Updated 4 months ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆36Updated 9 months ago
- Maltego Transforms for OSINT on Telegram Messenger☆345Updated 8 months ago
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆133Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆409Updated last month
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆273Updated last year
- ☆25Updated 7 months ago
- ☆333Updated 2 months ago
- Kali noise reduction tool☆318Updated 2 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆226Updated 6 months ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆187Updated 3 years ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆30Updated last week
- A good selection of Privacy & Infosec tools that will help you understand more about how to protect your online privacy and security.☆129Updated last month
- Collection of forensic tools☆653Updated 3 months ago
- Browser Chrome extensions, to help with OSINT, OPSEC, Privacy & Obfuscation.☆359Updated last month
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆282Updated 3 months ago
- ClatScope Info Tool – The best and most versatile OSINT utility for retrieving geolocation, DNS, WHOIS, phone, email, data breach informa…☆1,121Updated 2 weeks ago
- The Telegram Snowball Sampling Tool is a Python-based utility designed for conducting snowball sampling to collect Telegram channels thro…☆114Updated last year