eaglesquads
Analyzing unkown malware . . . . Including: Rootkit Modules Tables and unkown encryption
somewhere in the digital era... I think?, I hope so.
Pinned Repositories
awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
DoublePulsar
The DoublePulsar Framework and all its components
Incredibly_Interesting_Math
Math, Math, Math everywhere, MATH FOR EVERYONE! (No but srlsy- You will get "hooked" like a library used in code and software if you read this)
Meltdown-PoC-Windows
Source from https://twitter.com/pwnallthethings. Compiled in VS 2013
r77-rootkit
Ring 3 Rootkit DLL
SMB-CVE
CVE listings for Windows SMB vulnerabilities
spectre-attack
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
stuxnet-source-code
this is the source code of the stuxnet virus only for educational purpose or malware analysic
TOP-BEST-GITHUB-INFOSEC-PAGES
The very, (VERY) - Best, extremely well informing & detailed Github Users & Githbu Pages |!NOTE!| THIS IS ONLY MY OPINION! It's also made only for myself, soo.. But feel free to contribute! |!NOTE!|
eaglesquads's Repositories
eaglesquads/SMB-CVE
CVE listings for Windows SMB vulnerabilities
eaglesquads/Eliptic_Curve_Point_Generator
Uses Mod 23 to generate Eliptic Curve Points
eaglesquads/EQGRP-Auction-Files-1
完整版:the purported Equation Group(NSA下属) hack by the Shadow Brokers(影子经纪人)--234MB
eaglesquads/EQGRP-TrickOrTreat
The ORIGINAL decrypted copies of the Shadow Broker's Trick Or Treat release. Contains a list of servers, supposedly compromised by Equation Group as well as references to seven supposedly undisclosed tools (DEWDROP, INCISION, JACKLADDER, ORANGUTAN, PATCHICILLIN, RETICULUM, SIDETRACK AND STOCSURGEON) also used by the threat actor.
eaglesquads/RandomGen
Random Number Generator
eaglesquads/Meltdown-PoC-Windows
Source from https://twitter.com/pwnallthethings. Compiled in VS 2013
eaglesquads/spectre-attack
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
eaglesquads/Agent-Tesla-Exploit
Agent Tesla C2 Exploit
eaglesquads/CIAHackingTools
WikiLeaks Vault 7 CIA Hacking Tools
eaglesquads/DanderSpritz_docs
The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-exploitation framework leaked by the ShadowBrokers
eaglesquads/decompile-dump
Partial stuxnet source decompiled with hexrays, if anyone has better decompile tools feel free to contribute better versions.
eaglesquads/ElipticCurve-Diffie-Hellman
eaglesquads/EQGRP-2
NSA tool hacking
eaglesquads/EQGRP-Warez
The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primarily for compromising Linux/Unix based environments. Use for research purposes only. (ref: eqgrp-auction-file.tar.xz)
eaglesquads/KPTI-PoC-Collection
Meltdown/Spectre PoC src collection.
eaglesquads/malware-research
Samples, research and documents about any kind of malware and misc source which should be released to the public
eaglesquads/mini-tor
proof-of-concept implementation of tor protocol using Microsoft CNG/CryptoAPI
eaglesquads/Nunit_CShaprp_CheatSheet
Example implementations of each attribute available in Nunit2 unit Testing Framework using C# .NET.
eaglesquads/RandomNumberGeneratorBBS
eaglesquads/RT-OfficeBeaconBox
Simple Office-based beacon that calls back to your server for phishing exercises.
eaglesquads/ruby_smb
A native Ruby implementation of the SMB Protocol Family
eaglesquads/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
eaglesquads/server
eaglesquads/Stryker
Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303
eaglesquads/stuxnet
Open-source decompile of Stuxnet/myRTUs
eaglesquads/The-GTK-Keylogger
The GTK Keylogger
eaglesquads/Win10-LPE
The Windows 10 LPE exploit written by SandboxEscaper
eaglesquads/WinREPL
x86 and x64 assembly "read-eval-print loop" shell for Windows
eaglesquads/ZeroAccess
ZeroAccess v3 toolkit
eaglesquads/zeroload