mindcrypt / covertchannels-steganographyLinks
A list of covert channels and steganography/steganalysis resources (books, papers & tools)
☆100Updated 3 years ago
Alternatives and similar repositories for covertchannels-steganography
Users that are interested in covertchannels-steganography are comparing it to the libraries listed below
Sorting:
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆78Updated 2 years ago
- Active Directory Group Policy Preferences cpassword cracker/decrypter.☆24Updated 4 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆54Updated last year
- c0r0n4con talk 12 april 2020☆23Updated 5 years ago
- ☆53Updated 2 years ago
- MAEC Schemas and Schema Development☆89Updated 5 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Updated 2 years ago
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆227Updated 3 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆91Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆124Updated 2 years ago
- The DFRWS 2018 challenge (extended into 2019) is the second in a series of challenges dealing with Internet of Things (IoT). IoT is defin…☆56Updated 4 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆106Updated last year
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆39Updated 6 months ago
- ☆32Updated 3 months ago
- The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential …☆39Updated 12 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆120Updated 3 years ago
- Malquarium - Modern Malware Repository☆47Updated 2 weeks ago
- Hard-to-detect image steganography☆45Updated 10 months ago
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆41Updated 9 months ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆35Updated 3 weeks ago
- A list of attacks or malware using steganography or information hiding☆68Updated last year
- CYBAR OSINT CTF 2020☆22Updated 5 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆97Updated 4 years ago
- A steganalysis tool for detecting LSB steganography in images☆229Updated 7 years ago
- ☆70Updated 3 months ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- Run several volatility plugins at the same time☆115Updated 3 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year