mindcrypt / covertchannels-steganography
A list of covert channels and steganography/steganalysis resources (books, papers & tools)
☆87Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for covertchannels-steganography
- Hard-to-detect image steganography☆30Updated 7 months ago
- A free online class on network information hiding/steganography/covert channels.☆97Updated last month
- An open-source toolbox for steganalysis☆161Updated 2 weeks ago
- Android malware sample library.☆64Updated 2 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 6 months ago
- Online client-side manager for secure storage and sharing of secrets.☆44Updated 2 years ago
- Some YARA rules i will add from time to time☆61Updated last year
- Industrial Hacking Simulator☆25Updated last week
- Steganography in Twitter using retweets☆11Updated 2 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆80Updated last year
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 4 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆111Updated last year
- Open Mobility Security Project is an open source project dedicated to standardize a framework of technical controls to evaluate security …☆48Updated 3 years ago
- A steganalysis tool for detecting LSB steganography in images☆201Updated 6 years ago
- Landing page for MAEC docs☆20Updated 2 years ago
- ☆66Updated last month
- A Collection of Android Malware☆18Updated 5 years ago
- A Python malware analysis library.☆50Updated last year
- Tools for Network Archaeology (internet protocol analysis)☆28Updated 7 months ago
- c0r0n4con talk 12 april 2020☆23Updated 4 years ago
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆74Updated 11 months ago
- Simulates a compromise in a cloud and container environment☆32Updated 2 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆111Updated 2 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆81Updated 3 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆24Updated 3 years ago
- Malquarium - Modern Malware Repository☆47Updated 4 years ago
- PoC for extracting office files into PDF file metadata☆10Updated 5 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆42Updated 2 years ago
- A list of attacks or malware using steganography or information hiding☆56Updated 9 months ago