cdpxe / NetworkCovertChannels
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
☆16Updated 3 weeks ago
Alternatives and similar repositories for NetworkCovertChannels:
Users that are interested in NetworkCovertChannels are comparing it to the libraries listed below
- A free online class on network information hiding/steganography/covert channels.☆99Updated this week
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- ☆49Updated 6 years ago
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17Updated 3 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆41Updated 8 months ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆62Updated last year
- ☆105Updated 4 years ago
- ICS Cybersecurity PCAP respository☆52Updated 6 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 9 months ago
- ☆22Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆42Updated 2 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- A logic-based enterprise network security analyzer☆124Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆124Updated last month
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆40Updated last month
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆23Updated last year
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆111Updated 3 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆31Updated 2 months ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆172Updated 4 months ago
- Collection of Snort 2/3 rules.☆35Updated 6 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆148Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 4 months ago
- Code for shelLM tool☆51Updated 2 months ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆73Updated 10 months ago
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- An Adaptive Misuse Detection System☆38Updated 5 months ago
- ☆11Updated last year
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆32Updated 10 months ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆55Updated 4 years ago