mindcrypt / covertchannels-steganography
A list of covert channels and steganography/steganalysis resources (books, papers & tools)
☆96Updated 2 years ago
Alternatives and similar repositories for covertchannels-steganography:
Users that are interested in covertchannels-steganography are comparing it to the libraries listed below
- Hard-to-detect image steganography☆32Updated last month
- Steganography in Twitter using retweets☆11Updated 2 years ago
- This software is for study to Computer Hacker Forensic Investigator certification☆25Updated 5 years ago
- Open Mobility Security Project is an open source project dedicated to standardize a framework of technical controls to evaluate security …☆48Updated 4 years ago
- Industrial Hacking Simulator☆25Updated 2 months ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 9 months ago
- A steganalysis tool for detecting LSB steganography in images☆212Updated 6 years ago
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆75Updated last year
- A list of attacks or malware using steganography or information hiding☆63Updated last year
- A curated list of malware repositories, trackers and malware analysis tools☆84Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- A free online class on network information hiding/steganography/covert channels.☆98Updated last month
- Active Directory Group Policy Preferences cpassword cracker/decrypter.☆23Updated 3 years ago
- Online client-side manager for secure storage and sharing of secrets.☆43Updated 3 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆117Updated 6 years ago
- c0r0n4con talk 12 april 2020☆23Updated 4 years ago
- A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University☆179Updated last year
- Converting data from services like Censys and Shodan to a common data model☆49Updated 6 months ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆78Updated 4 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated last month
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- ☆48Updated 2 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated last year
- Curated list of awesome, open source data exfiltration tools☆58Updated 3 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆57Updated 3 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73Updated last year
- Various analysis of Android stalkerware☆108Updated 4 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆46Updated 7 years ago