Collection of my network covert channel tools.
☆17Mar 11, 2026Updated last week
Alternatives and similar repositories for NetworkCovertChannels
Users that are interested in NetworkCovertChannels are comparing it to the libraries listed below
Sorting:
- A free online class on network information hiding/steganography/covert channels.☆110Dec 15, 2025Updated 3 months ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28May 13, 2024Updated last year
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Jun 26, 2022Updated 3 years ago
- Resources for learning about application security☆56Jan 27, 2017Updated 9 years ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- anything I find interesting regarding reverse engineering☆13May 7, 2017Updated 8 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆101Jul 10, 2022Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆16Oct 10, 2023Updated 2 years ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- Parse greppable Nmap output as a tree☆14Nov 13, 2022Updated 3 years ago
- Snooze - Log aggregation and alerting☆10Sep 19, 2025Updated 6 months ago
- MetaSSH connects to and runs commands on thousands of machines in seconds.☆19Nov 1, 2018Updated 7 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- Geographical Information Science Tutorial and Practice course in UCAS☆13Dec 12, 2021Updated 4 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- ☆12Jun 11, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/narly☆24Jul 11, 2021Updated 4 years ago
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆12Jun 22, 2023Updated 2 years ago
- Linux内核驱动demo仓(lkm、ldd)☆13Apr 24, 2025Updated 10 months ago
- 基于netty实现的一个数据库代理服务,可用作动态脱敏系统☆12Feb 16, 2022Updated 4 years ago
- This repository is a transcription of the code from the YouTube channel 'Learn to Computer' (https://www.youtube.com/channel/UCcFVlUyZm22…☆12Jun 24, 2020Updated 5 years ago
- ☆12Feb 21, 2022Updated 4 years ago
- Generate network packets using generative modeling☆15May 17, 2023Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- A lightweight workshop build on the shoulders of giants.☆18Sep 13, 2019Updated 6 years ago
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Oct 26, 2024Updated last year
- ☆16Oct 17, 2019Updated 6 years ago
- Common code for hardening benchmarks☆10Jul 14, 2025Updated 8 months ago
- Virtual Enigma and Bombe eBPF simulation for real-time network packet encryption and cryptanalysis on Linux☆18Aug 4, 2025Updated 7 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Oct 1, 2016Updated 9 years ago
- BB-Gen: Packet Crafter☆16Aug 2, 2022Updated 3 years ago
- ☆17Dec 25, 2023Updated 2 years ago
- Privacy-preserving representations of training data for de-identification☆17Jul 6, 2022Updated 3 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- 基于Wi-Fi CSI和机器学习的环境异常感知☆18Apr 8, 2020Updated 5 years ago
- Telegram @CryptoBot Golang SDK to work with API☆18Dec 31, 2024Updated last year
- ☆15Apr 28, 2023Updated 2 years ago