cdpxe / Network-Covert-Channels-A-University-level-CourseLinks
A free online class on network information hiding/steganography/covert channels.
☆103Updated 4 months ago
Alternatives and similar repositories for Network-Covert-Channels-A-University-level-Course
Users that are interested in Network-Covert-Channels-A-University-level-Course are comparing it to the libraries listed below
Sorting:
- Presentation slides, blogs, and videos of my conference presentations.☆26Updated last year
- Research notes☆129Updated 10 months ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆118Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆61Updated last year
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆60Updated last week
- Malware Sandboxes & Malware Source☆101Updated 8 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 3 years ago
- A golang CLI tool to download malware from a variety of sources.☆150Updated 3 months ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆45Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- Just another collection of links, tools, reports and other stuff☆25Updated 4 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆129Updated 2 months ago
- Resources for learning malware analysis and reverse engineering☆135Updated last year
- Linpmem is a linux memory acquisition tool☆94Updated 4 months ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆116Updated 7 months ago
- Bootkit sample for firmware attack☆260Updated 11 months ago
- Some of my Malware Analysis writeups☆48Updated last month
- Volatility Symbol Generator for Linux Kernels☆36Updated last year
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆182Updated 3 weeks ago
- Code snips and notes☆137Updated 3 years ago
- API Logger for Windows Executables☆80Updated 5 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- My notes while studying Windows exploitation☆190Updated 2 years ago
- Powershell script deobfuscation using AST in Python☆72Updated last month
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆47Updated 3 years ago
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆56Updated 3 months ago
- A list of attacks or malware using steganography or information hiding☆67Updated last year
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 3 years ago
- Use YARA rules on Time Travel Debugging traces☆95Updated 2 years ago
- A comprehensive Hypervisor resources repo☆176Updated 3 weeks ago