cdpxe / NetworkCovertChannels
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
☆11Updated 11 months ago
Related projects: ⓘ
- A free online class on network information hiding/steganography/covert channels.☆92Updated last week
- Python based CLI for MalwareBazaar☆36Updated 9 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆35Updated this week
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆33Updated last month
- Modular malware analysis artifact collection and correlation framework☆49Updated 4 months ago
- Malware Detection using Machine Learning (MDML)☆46Updated last year
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- ☆21Updated 8 months ago
- A list of attacks or malware using steganography or information hiding☆51Updated 7 months ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆28Updated 3 months ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆54Updated 3 years ago
- Notes and IoCs of fresh malware☆58Updated 2 months ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆54Updated last year
- A simple way to exfiltrate data using spotify API☆17Updated 2 weeks ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆74Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆56Updated 4 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆76Updated 2 years ago
- Industrial Hacking Simulator☆25Updated 2 weeks ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆30Updated 2 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆19Updated last year
- ☆34Updated 9 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated last year
- Public Code for ICS Evasion Attack Generation☆39Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆45Updated 5 months ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated 8 months ago
- ☆37Updated 2 years ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆71Updated last week
- BPFDoor Scanner - Check for Compromised Hosts☆19Updated 2 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆71Updated this week