⌛️
-
Updated
Jun 3, 2024
⌛️
A template for myself to be used when creating Gits. \0
GAUSS MALWARE Source [Striking similarities with Duqu, FlameR!, Fanny, StuxNet and more.] Source coming soon! + Binaries + Video showing live-action (what it does, how to remove it & for those interested - how to change the source, compile it, and run it) (Only as a Academical Exercise obviously)
My Mark Down Template for Advanced Note Taking. Will look weird.
The Stars Virus (most likely correlated with StuXNet)
The Malware DoubleFantasy
[+] nls_933w.dll + [+] WIN32M.SYS MALWARE- ONLY FOR ACADEMICAL RESEARCH PURPOSES!
Metasploit-framework Module_fanny_check.rb : My own metasploit-framework module, to detect the fanny.bmp malware.
The Shadow Brokers "Lost In Translation" leak. Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg
完整版:the purported Equation Group(NSA下属) hack by the Shadow Brokers(影子经纪人)--234MB
2022 Updated Kernelmode-Code
fanny.bmp MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)
stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Samples,Fanny Added in another repo.
The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-exploitation framework leaked by the ShadowBrokers
A fully functional DanderSpritz lab in 2 commands
Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg
Decrypted content of eqgrp-auction-file.tar.xz
Add a description, image, and links to the equationgroup topic page so that developers can more easily learn about it.
To associate your repository with the equationgroup topic, visit your repo's landing page and select "manage topics."