lucacav / steg-in-the-wildView external linksLinks
A list of attacks or malware using steganography or information hiding
☆71Dec 15, 2025Updated 2 months ago
Alternatives and similar repositories for steg-in-the-wild
Users that are interested in steg-in-the-wild are comparing it to the libraries listed below
Sorting:
- A list of tools and material on steganography and information hiding☆17Jul 13, 2023Updated 2 years ago
- A CLI tool for creating network covert channels within .pcap files.☆16Jun 12, 2024Updated last year
- The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and…☆15Apr 17, 2025Updated 10 months ago
- IPv6CC implements several covert channels targeting the IPv6 protocol.☆11May 17, 2022Updated 3 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- UAC Bypass for windows☆38Feb 17, 2020Updated 6 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆38Aug 11, 2023Updated 2 years ago
- ☆11Updated this week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- intern☆10Sep 25, 2018Updated 7 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- ☆10Aug 17, 2025Updated 6 months ago
- Código fonte da calculadora de IMC☆13Oct 16, 2019Updated 6 years ago
- ☆15Aug 21, 2021Updated 4 years ago
- A web-based serverless application which works on a decentralized system for handling transactions between users ruling out the utilizati…☆13May 6, 2022Updated 3 years ago
- 50 React projects for beginners from easy to hard. Practice all of these projects to excel your React skills.☆12Sep 5, 2022Updated 3 years ago
- malwares by kapi2.0peys and Uuwai. Download at your own risk☆34Apr 27, 2025Updated 9 months ago
- Roadmap for Lantern development☆12Mar 2, 2018Updated 7 years ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- ☆11Jan 31, 2017Updated 9 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- ☆11Oct 17, 2024Updated last year
- ☆10May 9, 2019Updated 6 years ago
- ☆10Dec 7, 2015Updated 10 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43May 22, 2024Updated last year
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- ☆11Mar 12, 2020Updated 5 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago