lucacav / steg-in-the-wild
A list of attacks or malware using steganography or information hiding
☆60Updated 11 months ago
Alternatives and similar repositories for steg-in-the-wild:
Users that are interested in steg-in-the-wild are comparing it to the libraries listed below
- A free online class on network information hiding/steganography/covert channels.☆98Updated 3 months ago
- Malware Detection using Machine Learning (MDML)☆48Updated 2 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆41Updated 2 years ago
- ☆30Updated 3 years ago
- A machine learning malware analysis framework for Android apps.☆120Updated 9 months ago
- Notes and IoCs of fresh malware☆59Updated 6 months ago
- Malware Analysis Tools☆29Updated 5 years ago
- Android malware sample library.☆65Updated 2 years ago
- Warning! This repository contains samples of ransomware.☆92Updated 2 years ago
- Malware Analysis Techniques, published by Packt☆67Updated 2 years ago
- A collection of beautified and commented samples of malware implemented in Bash☆12Updated last year
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆50Updated 2 weeks ago
- bad stuffs by bad guys☆47Updated 2 years ago
- Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful!☆155Updated 3 years ago
- ☆323Updated this week
- Malware Sandboxes & Malware Source☆84Updated 7 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆51Updated 9 months ago
- Some of my Malware Analysis writeups.☆42Updated last year
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆83Updated 7 years ago
- Resources for learning malware analysis and reverse engineering☆104Updated 11 months ago
- ☆63Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆42Updated 3 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆80Updated last month
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆222Updated last year
- Packet captures of malicious traffic for analysis using Wireshark☆55Updated last year
- ☆120Updated 9 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆84Updated 2 years ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆57Updated 3 years ago