loneicewolf / Gauss-SrcLinks
GAUSS MALWARE Source [Striking similarities with Duqu, FlameR!, Fanny, StuxNet and more.] Source coming soon! + Binaries + Video showing live-action (what it does, how to remove it & for those interested - how to change the source, compile it, and run it) (Only as a Academical Exercise obviously)
☆17Updated 3 years ago
Alternatives and similar repositories for Gauss-Src
Users that are interested in Gauss-Src are comparing it to the libraries listed below
Sorting:
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated last month
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated last year
- ☆37Updated 5 months ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Updated 10 months ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Updated 7 years ago
- LOJAX ROOTKIT (UEFI) +PDF Included[x]☆33Updated 2 years ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated 11 months ago
- ☆10Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- using the gpu to hide your payload☆59Updated 3 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated 2 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆17Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- Polymorphic ELF Virus☆17Updated 3 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 8 months ago
- ☆24Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆55Updated 3 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆26Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- ☆74Updated last year