Collection of my network covert channel tools.
☆17Mar 11, 2026Updated last week
Alternatives and similar repositories for NetworkCovertChannels
Users that are interested in NetworkCovertChannels are comparing it to the libraries listed below
Sorting:
- The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and…☆15Apr 17, 2025Updated 11 months ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- anything I find interesting regarding reverse engineering☆13May 7, 2017Updated 8 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- FOMU keystroke injector☆12Aug 7, 2023Updated 2 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆16Oct 10, 2023Updated 2 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- Parse greppable Nmap output as a tree☆14Nov 13, 2022Updated 3 years ago
- MetaSSH connects to and runs commands on thousands of machines in seconds.☆19Nov 1, 2018Updated 7 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- Geographical Information Science Tutorial and Practice course in UCAS☆13Dec 12, 2021Updated 4 years ago
- adanos-alert is a alert manager with multi alert channel support☆20Nov 27, 2024Updated last year
- Anomaly detection using RAG☆17Apr 22, 2024Updated last year
- iptables-trace is an eBPF enhanced iptables-TRACE alternative iptables TRACE. GPL-3.0 license☆14Feb 3, 2025Updated last year
- Automatically exported from code.google.com/p/narly☆24Jul 11, 2021Updated 4 years ago
- Automated Safety Testing of Large Language Models☆18Jan 31, 2025Updated last year
- This repository is a transcription of the code from the YouTube channel 'Learn to Computer' (https://www.youtube.com/channel/UCcFVlUyZm22…☆12Jun 24, 2020Updated 5 years ago
- ☆12Feb 21, 2022Updated 4 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Oct 26, 2024Updated last year
- ☆16Oct 17, 2019Updated 6 years ago
- Common code for hardening benchmarks☆10Jul 14, 2025Updated 8 months ago
- Virtual Enigma and Bombe eBPF simulation for real-time network packet encryption and cryptanalysis on Linux☆18Aug 4, 2025Updated 7 months ago
- BB-Gen: Packet Crafter☆16Aug 2, 2022Updated 3 years ago
- In here you can find a random collection binaries from challenges, forums, ctfs meant to be reverse engineered.☆20Apr 17, 2018Updated 7 years ago
- ☆17Dec 25, 2023Updated 2 years ago
- Privacy-preserving representations of training data for de-identification☆17Jul 6, 2022Updated 3 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Telegram @CryptoBot Golang SDK to work with API☆18Dec 31, 2024Updated last year
- ☆13Dec 29, 2021Updated 4 years ago
- ☆15Apr 28, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- ntos internals☆23Dec 28, 2019Updated 6 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。