cdpxe / Network-Covert-Channels-A-University-level-CourseLinks
A free online class on network information hiding/steganography/covert channels.
☆102Updated 2 months ago
Alternatives and similar repositories for Network-Covert-Channels-A-University-level-Course
Users that are interested in Network-Covert-Channels-A-University-level-Course are comparing it to the libraries listed below
Sorting:
- Malware Samples that could be used for teaching students about malware analysis.☆58Updated last year
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆117Updated 5 months ago
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆60Updated last week
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆119Updated 2 years ago
- Volatility Symbol Generator for Linux Kernels☆36Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated last week
- Presentation slides, blogs, and videos of my conference presentations.☆26Updated last year
- Research notes☆128Updated 8 months ago
- Resources for learning malware analysis and reverse engineering☆130Updated last year
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Updated last year
- A golang CLI tool to download malware from a variety of sources.☆150Updated last month
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- My notes while studying Windows exploitation☆190Updated 2 years ago
- Malware Sandboxes & Malware Source☆100Updated 8 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆79Updated 8 years ago
- Recon 2023 slides and code☆79Updated 2 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆63Updated 2 years ago
- Just another collection of links, tools, reports and other stuff☆24Updated 4 years ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆43Updated 2 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 3 years ago
- Some of my Malware Analysis writeups☆46Updated 2 years ago
- Linpmem is a linux memory acquisition tool☆87Updated 2 months ago
- Powershell script deobfuscation using AST in Python☆69Updated last year
- Bootkit sample for firmware attack☆257Updated 9 months ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Second Part To Hell's artworks: artificial (life/evolution/intelligence)☆180Updated last year
- Batch script to compile a binary shellcode blob into an exe file☆88Updated 6 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 2 years ago
- Use YARA rules on Time Travel Debugging traces☆92Updated 2 years ago
- A list of attacks or malware using steganography or information hiding☆67Updated last year