lucacav / steg-in-the-wild
A list of attacks or malware using steganography or information hiding
☆56Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for steg-in-the-wild
- A free online class on network information hiding/steganography/covert channels.☆97Updated last month
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆41Updated 2 years ago
- Malware Detection using Machine Learning (MDML)☆47Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆47Updated 7 months ago
- Some of my Malware Analysis writeups.☆42Updated last year
- A simple and scalable Android bot emulation framework, as presented at Black Hat Europe 2021's Arsenal, as well as atHack 2021's Arsenal☆27Updated 3 years ago
- A machine learning malware analysis framework for Android apps.☆118Updated 7 months ago
- Just another collection of links, tools, reports and other stuff☆20Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆119Updated 3 years ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆56Updated 3 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆39Updated last month
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆124Updated 11 months ago
- Malware Analysis Tools☆29Updated 5 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆111Updated 2 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆38Updated 3 months ago
- Dataset of packed PE samples☆29Updated 4 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆117Updated 4 months ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆42Updated 6 months ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆62Updated last week
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆98Updated last year
- Presentation slides, blogs, and videos of my conference presentations.☆25Updated 9 months ago
- IoC Feed for security analysts etc.☆13Updated last year
- Warning! This repository contains samples of ransomware.☆91Updated last year
- Malware Sandboxes & Malware Source☆83Updated 7 years ago
- Resources for learning malware analysis and reverse engineering☆104Updated 9 months ago
- ☆64Updated last year
- A list of awesome malware detection tools☆72Updated 2 years ago
- bad stuffs by bad guys☆47Updated 2 years ago
- ☆26Updated 3 years ago
- A collection of beautified and commented samples of malware implemented in Bash☆10Updated last year