cdpxe / NetworkCovertChannelsLinks
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
☆16Updated 2 months ago
Alternatives and similar repositories for NetworkCovertChannels
Users that are interested in NetworkCovertChannels are comparing it to the libraries listed below
Sorting:
- A free online class on network information hiding/steganography/covert channels.☆102Updated last week
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆63Updated 2 years ago
- ☆55Updated 6 years ago
- ☆111Updated 5 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- ☆49Updated last year
- A collection of resources for security data☆41Updated 7 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆49Updated last year
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆34Updated last year
- Collection of Snort 2/3 rules.☆36Updated 7 years ago
- Code for shelLM tool☆55Updated 4 months ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆31Updated 2 years ago
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆47Updated last month
- Download pcap files from http://www.malware-traffic-analysis.net/☆78Updated 7 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆39Updated 2 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆52Updated 3 years ago
- ☆24Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 10 months ago
- Feature Extraction and Machine Learning from Network Traffic Traces☆69Updated 10 months ago
- A logic-based enterprise network security analyzer☆124Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated last year
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- A list of attacks or malware using steganography or information hiding☆67Updated last year
- ICS Cybersecurity PCAP respository☆53Updated 6 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆42Updated 11 months ago
- ☆25Updated last year
- An Adaptive Misuse Detection System☆42Updated 7 months ago
- ☆36Updated last year