cdpxe / CCEAPLinks
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
☆14Updated last month
Alternatives and similar repositories for CCEAP
Users that are interested in CCEAP are comparing it to the libraries listed below
Sorting:
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- A Python client for the Global CVE Allocation System.☆13Updated last week
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 11 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Quick and dirty script to parse bplists with Ruby☆12Updated 4 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Exploit, Malware and Vulnerability Scoring Application☆13Updated last year
- Hashes of infamous malware☆26Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 11 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Search a list of domains on the wayback machine☆15Updated 6 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆14Updated 7 years ago
- Checklists☆16Updated 8 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- A curated list of awesome malware analysis tools and resources☆14Updated 7 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- A curated threat modeling library collection☆22Updated last year
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago