cdpxe / NetworkCovertChannels
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
☆15Updated 3 months ago
Alternatives and similar repositories for NetworkCovertChannels:
Users that are interested in NetworkCovertChannels are comparing it to the libraries listed below
- A free online class on network information hiding/steganography/covert channels.☆98Updated 3 months ago
- ☆21Updated last year
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 8 months ago
- ☆45Updated 6 years ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆30Updated 7 months ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Pure python parser for Snort/Suricata rules.☆29Updated 10 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆38Updated 2 years ago
- ☆23Updated this week
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 5 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆30Updated last month
- Collection of Snort 2/3 rules.☆34Updated 6 years ago
- Public Code for ICS Evasion Attack Generation☆41Updated 3 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆22Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 3 years ago
- Malware Detection using Machine Learning (MDML)☆48Updated 2 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆32Updated last month
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- Python based CLI for MalwareBazaar☆36Updated 2 months ago
- ☆20Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆111Updated last year
- ☆29Updated 3 weeks ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆39Updated 2 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆39Updated 5 months ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 2 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆44Updated 8 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆40Updated 9 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year