mindcrypt / covertchannels-steganographyLinks
A list of covert channels and steganography/steganalysis resources (books, papers & tools)
☆99Updated 2 years ago
Alternatives and similar repositories for covertchannels-steganography
Users that are interested in covertchannels-steganography are comparing it to the libraries listed below
Sorting:
- Hard-to-detect image steganography☆39Updated 3 months ago
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆76Updated last year
- Steganography in Twitter using retweets☆11Updated 2 years ago
- Industrial Hacking Simulator☆27Updated 3 weeks ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆82Updated 4 years ago
- A steganalysis tool for detecting LSB steganography in images☆215Updated 6 years ago
- A list of attacks or malware using steganography or information hiding☆64Updated last year
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆33Updated last year
- A free online class on network information hiding/steganography/covert channels.☆101Updated last month
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- PDFExaminer Tool - Analyse PDF Malware☆57Updated 3 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated 2 years ago
- A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University☆186Updated last year
- Git repo for challenges of encryptCTF 2019☆24Updated 6 years ago
- c0r0n4con talk 12 april 2020☆23Updated 5 years ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆55Updated 6 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆68Updated 8 months ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆49Updated last year
- Graphical map of known Advanced Persistent Threats☆54Updated 2 months ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated 2 years ago
- Challenges and writeups for the US Cyber Open for 2024☆19Updated 11 months ago
- ☆51Updated 2 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆118Updated 2 years ago
- talks☆15Updated 3 weeks ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Android malware sample library.☆67Updated 3 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Various analysis of Android stalkerware☆111Updated 5 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago