lucacav / steg-in-the-wild
A list of attacks or malware using steganography or information hiding
☆64Updated last year
Alternatives and similar repositories for steg-in-the-wild
Users that are interested in steg-in-the-wild are comparing it to the libraries listed below
Sorting:
- A free online class on network information hiding/steganography/covert channels.☆100Updated 2 weeks ago
- Malware Analysis Tools☆30Updated 5 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆44Updated 2 years ago
- Notes and IoCs of fresh malware☆58Updated 10 months ago
- IOCs collected during day-to-day activities☆54Updated this week
- Malware Detection using Machine Learning (MDML)☆51Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆125Updated 10 months ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆47Updated last year
- Just another collection of links, tools, reports and other stuff☆24Updated 3 years ago
- Android malware sample library.☆67Updated 3 years ago
- Malware Analysis Techniques, published by Packt☆70Updated 2 years ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆141Updated 8 months ago
- Just some lists of Malware Configs☆170Updated 4 months ago
- Repository to index useful tools for CTF's☆26Updated this week
- ☆122Updated last year
- Malware Sandboxes & Malware Source☆93Updated 8 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆177Updated this week
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- Collection of resources that are made by the Malware Research community☆225Updated last year
- Graphical map of known Advanced Persistent Threats☆54Updated last month
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆118Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated 2 years ago
- ☆65Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- Industrial Hacking Simulator☆26Updated this week
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆100Updated 2 years ago
- Repository of open source malware here on Github!☆42Updated 3 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆58Updated last year
- Research notes☆124Updated 5 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago