mindcrypt / covertchannels-steganography
A list of covert channels and steganography/steganalysis resources (books, papers & tools)
☆95Updated 2 years ago
Alternatives and similar repositories for covertchannels-steganography:
Users that are interested in covertchannels-steganography are comparing it to the libraries listed below
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆75Updated last year
- A list of attacks or malware using steganography or information hiding☆60Updated 11 months ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 8 months ago
- A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University☆179Updated last year
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated last year
- A free online class on network information hiding/steganography/covert channels.☆98Updated 3 months ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆30Updated 7 months ago
- A steganalysis tool for detecting LSB steganography in images☆206Updated 6 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated last year
- Curated list of awesome, open source data exfiltration tools☆57Updated 3 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆44Updated 8 months ago
- Industrial Hacking Simulator☆25Updated last week
- an awesome list of active defense resources☆116Updated 4 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆116Updated last year
- Resources for learning malware analysis and reverse engineering☆104Updated 11 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆111Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆113Updated 2 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆82Updated last year
- c0r0n4con talk 12 april 2020☆23Updated 4 years ago
- Malware Data Science Reading Diary / Notes☆120Updated 5 years ago
- ☆36Updated 5 years ago
- Trace Labs - Search Party CTF Writeups☆88Updated last month
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated last year
- Malware Analysis Techniques, published by Packt☆67Updated 2 years ago
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆52Updated 4 years ago
- Active Directory Group Policy Preferences cpassword cracker/decrypter.☆23Updated 3 years ago
- PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282☆47Updated 7 months ago
- ☆66Updated 3 months ago
- Incident Response Triage - Windows Evidence Collection for Forensic Analysis☆130Updated 8 years ago