cdpxe / NetworkCovertChannels
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
☆14Updated last month
Related projects ⓘ
Alternatives and complementary repositories for NetworkCovertChannels
- A free online class on network information hiding/steganography/covert channels.☆97Updated last month
- ☆44Updated 6 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 6 months ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆20Updated 11 months ago
- ☆21Updated 10 months ago
- Public Code for ICS Evasion Attack Generation☆40Updated 3 years ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆30Updated 5 months ago
- ☆29Updated 8 months ago
- ☆19Updated 3 years ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆37Updated last year
- A curated list of resources related to Industrial Control System (ICS) security.☆20Updated 3 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆24Updated 3 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆38Updated 3 months ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆42Updated 6 months ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆63Updated 5 months ago
- This repository contains usage documentation for the Python module PyShark. It also provides various Python methods for processing, filt…☆41Updated 4 months ago
- Malware Detection using Machine Learning (MDML)☆47Updated last year
- ☆19Updated 4 years ago
- ☆29Updated this week
- ☆19Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆21Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆29Updated last month
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆119Updated 2 months ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated 9 months ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆65Updated 6 months ago
- The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and…☆13Updated 3 weeks ago
- ☆27Updated 3 years ago
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆37Updated 2 years ago
- Collection of Snort 2/3 rules.☆32Updated 6 years ago