cdpxe / NetworkCovertChannels
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
☆15Updated last month
Alternatives and similar repositories for NetworkCovertChannels:
Users that are interested in NetworkCovertChannels are comparing it to the libraries listed below
- A free online class on network information hiding/steganography/covert channels.☆98Updated last month
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆62Updated last year
- ☆48Updated 6 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆19Updated 5 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆40Updated 7 months ago
- Code for shelLM tool☆51Updated last month
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 7 months ago
- A list of attacks or malware using steganography or information hiding☆61Updated last year
- ICS Cybersecurity PCAP respository☆51Updated 6 years ago
- ☆21Updated 3 years ago
- ☆21Updated last year
- An Adaptive Misuse Detection System☆37Updated 4 months ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆43Updated 4 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆72Updated 8 months ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆31Updated 9 months ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 9 months ago
- ☆25Updated last year
- OpenWRT Suricata package☆46Updated 7 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆38Updated last week
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆64Updated last year
- The Security Analyst’s Guide to Suricata☆54Updated 9 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated 11 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated last year
- ☆101Updated 4 years ago
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 2 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆43Updated 11 months ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆49Updated 3 years ago