Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.
☆13Apr 19, 2017Updated 8 years ago
Alternatives and similar repositories for Dissembling-Ferret
Users that are interested in Dissembling-Ferret are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tools and library to manipulate EFI variables.☆10Mar 17, 2026Updated last week
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- Linux assembly programs☆18Updated this week
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- Toolkit for Machine Learning & Analytics Use Cases.☆13Aug 30, 2018Updated 7 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- jt65stego project for the purposes of theoretical study and education on the topic of steganography in the JT65 amateur radio protocol☆20Aug 24, 2014Updated 11 years ago
- TRS-80 Star Trek 2014 !!☆17Nov 20, 2025Updated 4 months ago
- A tool for dumping wtmp files and patching wtmp records☆20Jul 20, 2019Updated 6 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- collateral from http://basicinputoutput.com☆15Feb 15, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- A deep one-class classification based method for the task of high-dimensional anomaly detection for large-scale applications.☆11Oct 6, 2017Updated 8 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- 嵌套滑动示例☆12Mar 27, 2022Updated 3 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Ansible collection to support NetApp StorageGrid configuration.☆10Mar 3, 2026Updated 3 weeks ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- Anatomy of a linux kernel development☆27Mar 30, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pearson product-moment correlation coefficient☆13Dec 11, 2016Updated 9 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- ☆87Nov 9, 2014Updated 11 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- ☆27Oct 31, 2025Updated 4 months ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated last month
- LongQin-java 是一款基于Spring Boot、Spring Cloud、Vue3、Element Plus的前后端分离微服务低代码工作流平台,内置模块如:部门管理、角色用户、菜单、数据权限、日志管理、表单设计器、流程设计器、列表设计器、图表设计器等。可用于企业…☆16Oct 10, 2025Updated 5 months ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- Ueberauth Strategy for Keycloak / RH-SSO☆12Jan 7, 2024Updated 2 years ago
- ☆24Dec 6, 2015Updated 10 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- A command line tool to enumerate TLS cipher-suites supported by a server☆35Apr 25, 2017Updated 8 years ago