cdpxe / Network-Covert-Channels-A-University-level-CourseLinks
A free online class on network information hiding/steganography/covert channels.
☆102Updated 3 months ago
Alternatives and similar repositories for Network-Covert-Channels-A-University-level-Course
Users that are interested in Network-Covert-Channels-A-University-level-Course are comparing it to the libraries listed below
Sorting:
- Malware Samples that could be used for teaching students about malware analysis.☆58Updated last year
- Mastering Malware Analysis - Second Edition, published by Packt.☆44Updated 2 years ago
- Just another collection of links, tools, reports and other stuff☆24Updated 4 years ago
- Second Part To Hell's artworks: artificial (life/evolution/intelligence)☆182Updated last year
- Malware Sandboxes & Malware Source☆101Updated 8 years ago
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆60Updated last week
- A golang CLI tool to download malware from a variety of sources.☆150Updated 2 months ago
- A comprehensive Hypervisor resources repo☆118Updated 3 weeks ago
- Bootkit sample for firmware attack☆259Updated 9 months ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 3 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- Linpmem is a linux memory acquisition tool☆88Updated 3 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆66Updated 2 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 3 years ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆62Updated 4 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆118Updated 2 years ago
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆52Updated last month
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated last month
- My notes while studying Windows exploitation☆190Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆112Updated 2 years ago
- Research notes☆129Updated 9 months ago
- ☆68Updated 2 years ago
- ☆113Updated 2 months ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆116Updated 6 months ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆189Updated last month
- A curated list of awesome Windows Exploitation resources, and shiny things.☆80Updated 8 years ago
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Repository of Yara Rules☆118Updated last week