lucacav / steg-in-the-wildLinks
A list of attacks or malware using steganography or information hiding
☆67Updated last year
Alternatives and similar repositories for steg-in-the-wild
Users that are interested in steg-in-the-wild are comparing it to the libraries listed below
Sorting:
- A free online class on network information hiding/steganography/covert channels.☆102Updated last week
- Warning! This repository contains samples of ransomware.☆91Updated 2 years ago
- Malware Sandboxes & Malware Source☆95Updated 8 years ago
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- Some of my Malware Analysis writeups☆46Updated last year
- ☆122Updated last year
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆49Updated last year
- Just some lists of Malware Configs☆170Updated 5 months ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆45Updated 3 years ago
- ☆33Updated 4 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆56Updated last year
- A curated list of malware repositories, trackers and malware analysis tools☆85Updated 2 years ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆142Updated 9 months ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆118Updated 2 years ago
- The best tools and resources for forensic analysis.☆158Updated 2 years ago
- Python scripts for Malware Bazaar☆153Updated last year
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆60Updated last week
- A machine learning malware analysis framework for Android apps.☆129Updated last year
- Malware Analysis Tools☆30Updated 5 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated 11 months ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆235Updated 2 months ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆78Updated last month
- Research notes☆126Updated 6 months ago
- Malware vulnerability intel tool for third-party attackers☆120Updated 8 months ago
- Dataset of packed PE samples☆35Updated 11 months ago
- ☆366Updated this week
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Just another collection of links, tools, reports and other stuff☆25Updated 4 years ago
- 0xpat blog☆100Updated 3 years ago
- IoC Feed for security analysts etc.☆13Updated 2 years ago