cdpxe / Network-Covert-Channels-A-University-level-CourseLinks
A free online class on network information hiding/steganography/covert channels.
☆109Updated last month
Alternatives and similar repositories for Network-Covert-Channels-A-University-level-Course
Users that are interested in Network-Covert-Channels-A-University-level-Course are comparing it to the libraries listed below
Sorting:
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆62Updated this week
- ELFEN: Automated Linux Malware Analysis Sandbox☆136Updated 5 months ago
- Linpmem is a linux memory acquisition tool☆95Updated 7 months ago
- Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC)…☆16Updated 10 months ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 11 months ago
- Malware Sandboxes & Malware Source☆109Updated 8 years ago
- Research notes☆131Updated last year
- Volatility Symbol Generator for Linux Kernels☆37Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- A golang CLI tool to download malware from a variety of sources.☆151Updated 7 months ago
- A list of attacks or malware using steganography or information hiding☆70Updated last month
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆120Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Updated 3 years ago
- Powershell script deobfuscation using AST in Python☆73Updated 4 months ago
- My notes while studying Windows exploitation☆193Updated 2 years ago
- Malware Analysis Tools☆31Updated 6 years ago
- Bootkit sample for firmware attack☆266Updated last year
- ☆126Updated last week
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Recon 2023 slides and code☆80Updated 2 years ago
- Presentation slides, blogs, and videos of my conference presentations.☆26Updated 2 years ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆127Updated 7 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆94Updated 3 months ago
- Reverse engineering software using a full system simulator☆191Updated this week
- Some of my Malware Analysis writeups☆49Updated 4 months ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆44Updated 3 years ago