A list of covert channels and steganography/steganalysis resources (books, papers & tools)
☆101Jul 10, 2022Updated 3 years ago
Alternatives and similar repositories for covertchannels-steganography
Users that are interested in covertchannels-steganography are comparing it to the libraries listed below
Sorting:
- Implementation of several Steganography and steganalysis techniques.☆49Nov 20, 2025Updated 3 months ago
- talks☆15May 8, 2025Updated 9 months ago
- Update an ECS service to use a new Docker image☆13Updated this week
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Konrads' Pen-Ultimate (Windows) Log File Parser☆14Dec 27, 2025Updated 2 months ago
- ☆12Apr 20, 2017Updated 8 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆78Dec 7, 2023Updated 2 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Feb 16, 2019Updated 7 years ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- An open-source toolbox for steganalysis☆197Feb 12, 2026Updated 3 weeks ago
- A list of attacks or malware using steganography or information hiding☆71Dec 15, 2025Updated 2 months ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- ☆11Dec 1, 2021Updated 4 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- Online client-side manager for secure storage and sharing of secrets.☆41Feb 21, 2022Updated 4 years ago
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 2 years ago
- Minimalist containerized implementation of Prowler from https://github.com/toniblyx/prowler, made to run within ECS Fargate and have Secr…☆18May 17, 2019Updated 6 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- A Python interface for Syndrome Trellis Codes Steganography☆20Mar 3, 2025Updated last year
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 4 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆20May 16, 2023Updated 2 years ago
- The EMV QR Code Decoder Library is a Kotlin-based utility that decodes EMV QR codes into structured data. It provides classes and enums t…☆12Apr 13, 2024Updated last year
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- 382 Slayer Leecher Keywords.☆10Apr 19, 2021Updated 4 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆25Aug 5, 2016Updated 9 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- ☆12Apr 8, 2022Updated 3 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆23Oct 31, 2018Updated 7 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- A python module for orchestrating content acquisitions and analysis via amazon ssm.☆58Nov 2, 2023Updated 2 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago