lucacav / steg-in-the-wild
A list of attacks or malware using steganography or information hiding
☆63Updated last year
Alternatives and similar repositories for steg-in-the-wild:
Users that are interested in steg-in-the-wild are comparing it to the libraries listed below
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆46Updated 11 months ago
- A free online class on network information hiding/steganography/covert channels.☆99Updated last week
- Real Android malware apps discussed in the book☆37Updated last year
- Some of my Malware Analysis writeups.☆45Updated last year
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated last year
- ☆121Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- Malware Analysis Tools☆30Updated 5 years ago
- Malware Sandboxes & Malware Source☆93Updated 7 years ago
- Malware Detection using Machine Learning (MDML)☆50Updated 2 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆44Updated 6 months ago
- A curated list of malware repositories, trackers and malware analysis tools☆84Updated 2 years ago
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆100Updated 2 years ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆141Updated 7 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆40Updated 2 months ago
- ☆65Updated 2 years ago
- Notes and IoCs of fresh malware☆57Updated 9 months ago
- A machine learning malware analysis framework for Android apps.☆126Updated last year
- ☆48Updated last week
- Warning! This repository contains samples of ransomware.☆91Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- ☆32Updated 4 years ago
- IOCs collected during day-to-day activities☆48Updated this week
- Collection of resources that are made by the Malware Research community☆225Updated last year
- ☆42Updated 2 weeks ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆28Updated 10 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆122Updated 9 months ago
- Malware vulnerability intel tool for third-party attackers☆116Updated 6 months ago
- Just some lists of Malware Configs☆169Updated 3 months ago