GAUSS MALWARE Source [Striking similarities with Duqu, FlameR!, Fanny, StuxNet and more.] Source coming soon! + Binaries + Video showing live-action (what it does, how to remove it & for those interested - how to change the source, compile it, and run it) (Only as a Academical Exercise obviously)
☆18Aug 4, 2022Updated 3 years ago
Alternatives and similar repositories for Gauss-Src
Users that are interested in Gauss-Src are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Mar 4, 2024Updated 2 years ago
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆238Aug 28, 2024Updated last year
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆17Oct 8, 2024Updated last year
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆45Jul 9, 2025Updated 9 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 2022 Updated Kernelmode-Code☆32Mar 23, 2024Updated 2 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Mar 10, 2023Updated 3 years ago
- Malicious computer worm Stuxnet and drivers☆80Mar 17, 2022Updated 4 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Helping navigate through maps to prefer road-way.☆11Apr 6, 2022Updated 4 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 7 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- an iSCSI demo driver for Windows☆12Sep 21, 2015Updated 10 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Monitoring a high precision 10MHz GPS disciplined oscillator (GPSDO)☆14Dec 1, 2024Updated last year
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- IDA Taskr is a pure Python library for IDA Pro related parallel computing. It lets you use the power of Qt (built-in to IDA!) and Python'…☆29Feb 3, 2026Updated 2 months ago
- this is the source code of the stuxnet virus only for educational purpose or malware analysic☆72Jan 25, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- WizardsToolkit is a secure C library offering cross-platform cryptography, hashing, authentication, and data integrity tools. It supports…☆16Feb 16, 2026Updated 2 months ago
- Some malware samples or suspicious files I found and their reports.☆41Nov 28, 2021Updated 4 years ago
- ☆10Oct 11, 2020Updated 5 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- ☆13Feb 16, 2016Updated 10 years ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- kali linux tutorials and commands for ethical hackers and penetration testing☆10Jul 6, 2025Updated 9 months ago
- Exploring Pegasus Spyware: A Deep Dive☆11Nov 25, 2023Updated 2 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- Files that dictate the tauOS OSTree☆11Jun 28, 2023Updated 2 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Mar 12, 2024Updated 2 years ago