A list of covert channels and steganography/steganalysis resources (books, papers & tools)
☆103Jul 10, 2022Updated 3 years ago
Alternatives and similar repositories for covertchannels-steganography
Users that are interested in covertchannels-steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of several Steganography and steganalysis techniques.☆50Nov 20, 2025Updated 4 months ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Jun 26, 2022Updated 3 years ago
- A CLI tool for creating network covert channels within .pcap files.☆16Jun 12, 2024Updated last year
- Collection of my network covert channel tools.☆17Mar 11, 2026Updated last month
- Minimalist containerized implementation of Prowler from https://github.com/toniblyx/prowler, made to run within ECS Fargate and have Secr…☆18May 17, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆11Dec 1, 2021Updated 4 years ago
- A collection of steganography tools.☆15Nov 2, 2020Updated 5 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆58Dec 17, 2019Updated 6 years ago
- Spoof parent process ID☆14Jan 23, 2019Updated 7 years ago
- ☆12Apr 20, 2017Updated 8 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- A Python interface for Syndrome Trellis Codes Steganography☆20Mar 3, 2025Updated last year
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28May 13, 2024Updated last year
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Sep 16, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A python module for orchestrating content acquisitions and analysis via amazon ssm.☆58Nov 2, 2023Updated 2 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 2 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆20Jun 27, 2019Updated 6 years ago
- 基于位平面压缩和直方图平移法的图像可逆信息隐藏算法☆16Jul 11, 2019Updated 6 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- PC免杀远控winos4.0成品☆34Mar 26, 2025Updated last year
- This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse pr…☆14Feb 20, 2023Updated 3 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆60Nov 22, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Add export function and convert exe to dll☆27Sep 20, 2020Updated 5 years ago
- NTS proof of concept in Python☆10Jan 1, 2023Updated 3 years ago
- A Binary Ninja plugin that uses bruteforced XFG hashes to recover precise function prototypes☆16Feb 7, 2024Updated 2 years ago
- Run TTPs, with AI!☆125Feb 23, 2026Updated last month
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆51Jul 6, 2025Updated 9 months ago
- Steganography Tool for PNG Images☆19Mar 31, 2026Updated 2 weeks ago
- Standalone Metasploit-like XOR encoder for shellcode☆51May 12, 2024Updated last year
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- NCrypt portable crypter is a collection of C++ build tools, a tiny C compiler for the stub, and a useful codebase for anyone wanting to c…☆17Mar 14, 2024Updated 2 years ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆49Aug 16, 2025Updated 8 months ago
- The EMV QR Code Decoder Library is a Kotlin-based utility that decodes EMV QR codes into structured data. It provides classes and enums t…☆12Apr 13, 2024Updated 2 years ago
- Multi-threaded web application directory bruteforcer☆29Feb 4, 2019Updated 7 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- A steganalysis tool for detecting LSB steganography in images☆239Aug 14, 2018Updated 7 years ago
- ☆27May 1, 2020Updated 5 years ago