mindcrypt / covertchannels-steganographyLinks
A list of covert channels and steganography/steganalysis resources (books, papers & tools)
☆102Updated 2 years ago
Alternatives and similar repositories for covertchannels-steganography
Users that are interested in covertchannels-steganography are comparing it to the libraries listed below
Sorting:
- Hard-to-detect image steganography☆40Updated 4 months ago
- A steganalysis tool for detecting LSB steganography in images☆218Updated 6 years ago
- A free online class on network information hiding/steganography/covert channels.☆102Updated last week
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆78Updated last year
- An open-source toolbox for steganalysis☆175Updated this week
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆34Updated last year
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated 2 years ago
- A list of attacks or malware using steganography or information hiding☆67Updated last year
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆49Updated last year
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated 2 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated this week
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73Updated 2 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- c0r0n4con talk 12 april 2020☆23Updated 5 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆88Updated 2 years ago
- Malquarium - Modern Malware Repository☆47Updated this week
- Industrial Hacking Simulator☆27Updated last month
- Steganography in Twitter using retweets☆11Updated 3 years ago
- Malware captured with honeypots☆38Updated 7 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆27Updated 4 years ago
- The DFRWS 2018 challenge (extended into 2019) is the second in a series of challenges dealing with Internet of Things (IoT). IoT is defin…☆57Updated 3 years ago
- Data to test capa's code and rules.☆42Updated last week
- Various capabilities for static malware analysis.☆78Updated 9 months ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆13Updated last year
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆49Updated 4 months ago
- Yara Based Detection Engine for web browsers☆49Updated 3 years ago
- Learning volatility plugins.☆19Updated 4 years ago