The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
☆15Apr 17, 2025Updated last year
Alternatives and similar repositories for CCEAP
Users that are interested in CCEAP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27May 13, 2024Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Control a system remotely via telegram in Powershell☆15Mar 28, 2025Updated last year
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- A tool for extracting and filtering URLs, IPs, domains, and subdomains from text or web pages, with built-in web scraping capabilities.☆21Apr 27, 2026Updated 3 weeks ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- BloodHound Automation: Collection, Analysis and Data Import☆21May 11, 2026Updated last week
- A Selenium scraper for public domain search tools.☆18Oct 27, 2024Updated last year
- This project focuses on detecting cyberattacks using advanced analytical techniques and a deep learning model. It leverages structured da…☆10Feb 21, 2025Updated last year
- SaltStack formula to set up my personal Qubes OS configuration☆21Feb 2, 2020Updated 6 years ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆78Sep 1, 2025Updated 8 months ago
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆23Oct 31, 2024Updated last year
- A template to create your own literature survey engine☆14Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆33May 14, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Batch PDF operations for Swift☆14Apr 20, 2026Updated last month
- This tool provides a fast and efficient way to convert text into vector embeddings and store them in the Qdrant search engine. Built with…☆15Mar 31, 2023Updated 3 years ago
- A library that injects into SpringBoard and bruteforce the 4-digit lockscreen pin.☆10Mar 24, 2015Updated 11 years ago
- Code that drives the public web-based tools for the Media Cloud Online News Archive and Directory.☆11Updated this week
- Visual Studio Code Target Communication Framework (TCF) Debugger Extension☆10Mar 3, 2026Updated 2 months ago
- Analysis code for knowledge discovery project☆12Sep 25, 2018Updated 7 years ago
- Script para la instalación automática de una capa de personalización en Kali Linux OS.☆17Updated this week
- WatchTower - A platform to save your valuable time while staying updated in the Cyber realm.☆18Dec 31, 2025Updated 4 months ago
- A python library to interact with Pwndoc instances for pentest reports generation☆23May 19, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code and data for the CIKM2021 paper "Learning Ideological Embeddings From Information Cascades"☆10Sep 8, 2021Updated 4 years ago
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆19Oct 27, 2024Updated last year
- Examples for using the Pipl SEARCH API☆11Dec 19, 2023Updated 2 years ago
- Cyber Equipment for Carrying out Pentesting and Server Defense from Hacker Attack Activities☆24Oct 16, 2025Updated 7 months ago
- This Network-graph based literature review tool uses the open-source version of Neo4j with Jupyter Notebooks written in Python to import …☆14Oct 30, 2023Updated 2 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Feb 11, 2025Updated last year
- Encryption for Journalists - Hacks/Hackers NYC☆40Oct 3, 2013Updated 12 years ago
- Run TOR conveniently from a multi-platform docker container.☆27Updated this week
- Awesome Entity Alignment is a collection of EA techniques, including papers, codes, and datasets.☆11Oct 27, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- A collaborative research platform for resources on natural language texts☆16May 11, 2026Updated last week
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Oct 31, 2021Updated 4 years ago
- CLI tool for filtering URLs/IPs with automatically-updated Bug Bounty program scope rules.☆36Dec 31, 2025Updated 4 months ago
- An ecosystem and environment for an all-in-one note taking and research framework.☆17May 3, 2025Updated last year
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆17Jul 1, 2020Updated 5 years ago
- 🔓 CLI tool to decrypt backup files exported from the 2FAS Authenticator app. This application is neither affiliated with Two Factor Auth…☆24May 14, 2026Updated last week