lucacav / steg-in-the-wild
A list of attacks or malware using steganography or information hiding
☆63Updated last year
Alternatives and similar repositories for steg-in-the-wild:
Users that are interested in steg-in-the-wild are comparing it to the libraries listed below
- A free online class on network information hiding/steganography/covert channels.☆99Updated 2 months ago
- ☆32Updated 4 years ago
- Some of my Malware Analysis writeups.☆44Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆44Updated 5 months ago
- ☆120Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated 11 months ago
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆99Updated 2 years ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆30Updated last year
- Malware Detection using Machine Learning (MDML)☆49Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- Notes and IoCs of fresh malware☆57Updated 8 months ago
- Just another collection of links, tools, reports and other stuff☆25Updated 3 years ago
- Presentation slides, blogs, and videos of my conference presentations.☆27Updated last year
- Malware Analysis Tools☆30Updated 5 years ago
- A simple stiller with sending logs to your EMAIL, in case of inactivity, write to me in Discord- R3VENGE#1539☆55Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆122Updated 8 months ago
- bad stuffs by bad guys☆48Updated 2 years ago
- ☆27Updated 4 years ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆57Updated 3 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆83Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- Android malware sample library.☆66Updated 2 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆46Updated 11 months ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Code for shelLM tool☆51Updated 2 months ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆114Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆115Updated 2 years ago
- Warning! This repository contains samples of ransomware.☆91Updated 2 years ago
- Resources for our (extended) version of our IMC Crypto-Mining Malware paper☆31Updated 5 years ago
- Just some lists of Malware Configs☆169Updated 2 months ago