lucacav / steg-in-the-wild
A list of attacks or malware using steganography or information hiding
☆61Updated last year
Alternatives and similar repositories for steg-in-the-wild:
Users that are interested in steg-in-the-wild are comparing it to the libraries listed below
- Malware Detection using Machine Learning (MDML)☆48Updated 2 years ago
- Malware Analysis Techniques, published by Packt☆69Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆115Updated 4 months ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆40Updated 2 years ago
- A free online class on network information hiding/steganography/covert channels.☆98Updated last month
- Notes and IoCs of fresh malware☆57Updated 7 months ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆57Updated 3 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆42Updated 2 years ago
- Just some lists of Malware Configs☆168Updated last month
- ☆36Updated 2 years ago
- Just another collection of links, tools, reports and other stuff☆25Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated 10 months ago
- ☆120Updated 11 months ago
- ☆65Updated 2 years ago
- ☆30Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆122Updated 3 years ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆87Updated 4 years ago
- Android malware sample library.☆65Updated 2 years ago
- ☆42Updated this week
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆114Updated 2 years ago
- File analysis and management framework.☆82Updated last year
- Graphical map of known Advanced Persistent Threats☆49Updated last year
- Malware Analysis Tools☆30Updated 5 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 2 months ago
- Resources for learning malware analysis and reverse engineering☆106Updated last year
- A machine learning malware analysis framework for Android apps.☆125Updated 10 months ago
- ☆27Updated 4 years ago
- Code for shelLM tool☆51Updated last month
- Some of my Malware Analysis writeups.☆43Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated last year