lucacav / steg-in-the-wildLinks
A list of attacks or malware using steganography or information hiding
☆67Updated last year
Alternatives and similar repositories for steg-in-the-wild
Users that are interested in steg-in-the-wild are comparing it to the libraries listed below
Sorting:
- A free online class on network information hiding/steganography/covert channels.☆102Updated 3 months ago
- Some of my Malware Analysis writeups☆46Updated 2 years ago
- A machine learning malware analysis framework for Android apps.☆132Updated last year
- Notes and IoCs of fresh malware☆59Updated last year
- Malware Sandboxes & Malware Source☆101Updated 8 years ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆44Updated 2 years ago
- Presentation slides, blogs, and videos of my conference presentations.☆26Updated last year
- Android malware sample library.☆69Updated 3 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- ☆34Updated 4 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Updated 3 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆85Updated last week
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆122Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 3 months ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆86Updated 8 years ago
- Resources for learning malware analysis and reverse engineering☆134Updated last year
- A list of useful tools for Malware Analysis (will be updated regularly)☆142Updated last month
- Volatility Symbol Generator for Linux Kernels☆36Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated last month
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- Malware vulnerability intel tool for third-party attackers☆122Updated 10 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆89Updated 5 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated last week
- Powershell script deobfuscation using AST in Python☆70Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- Collection of resources that are made by the Malware Research community☆231Updated 2 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆55Updated 5 months ago
- ☆74Updated last year