mindcrypt / covertchannels-steganographyLinks
A list of covert channels and steganography/steganalysis resources (books, papers & tools)
☆100Updated 3 years ago
Alternatives and similar repositories for covertchannels-steganography
Users that are interested in covertchannels-steganography are comparing it to the libraries listed below
Sorting:
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆79Updated 2 years ago
- c0r0n4con talk 12 april 2020☆23Updated 5 years ago
- Malquarium - Modern Malware Repository☆47Updated 2 months ago
- Active Directory Group Policy Preferences cpassword cracker/decrypter.☆24Updated 4 years ago
- Online client-side manager for secure storage and sharing of secrets.☆41Updated 3 years ago
- repository of tools & resources of the MMD team☆138Updated 3 years ago
- CYBAR OSINT CTF 2020☆23Updated 5 years ago
- The DFRWS 2018 challenge (extended into 2019) is the second in a series of challenges dealing with Internet of Things (IoT). IoT is defin…☆56Updated 4 years ago
- Scripts to analyze stuff☆146Updated 6 months ago
- MAEC Schemas and Schema Development☆89Updated 5 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆94Updated 2 years ago
- ☆71Updated 5 months ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 months ago
- Valhalla API Client☆70Updated last week
- an awesome list of active defense resources☆128Updated 5 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆121Updated 3 years ago
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆51Updated 11 months ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆46Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆56Updated 4 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- A list of Autopsy awesome plugins.☆76Updated 4 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆58Updated last year
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 6 months ago
- Learning volatility plugins.☆18Updated 4 years ago
- ☆29Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Updated 2 years ago