A list of covert channels and steganography/steganalysis resources (books, papers & tools)
☆101Jul 10, 2022Updated 3 years ago
Alternatives and similar repositories for covertchannels-steganography
Users that are interested in covertchannels-steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of tools and material on steganography and information hiding☆17Jul 13, 2023Updated 2 years ago
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆26Jan 4, 2022Updated 4 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Feb 16, 2019Updated 7 years ago
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- Hard-to-detect image steganography☆52Feb 8, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Minimalist containerized implementation of Prowler from https://github.com/toniblyx/prowler, made to run within ECS Fargate and have Secr…☆18May 17, 2019Updated 6 years ago
- talks☆15May 8, 2025Updated 10 months ago
- ☆17Jun 14, 2017Updated 8 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- An open-source toolbox for steganalysis☆200Mar 13, 2026Updated last week
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆78Dec 7, 2023Updated 2 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- A Python interface for Syndrome Trellis Codes Steganography☆20Mar 3, 2025Updated last year
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A python module for orchestrating content acquisitions and analysis via amazon ssm.☆58Nov 2, 2023Updated 2 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 2 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse pr…☆14Feb 20, 2023Updated 3 years ago
- The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"☆13Oct 12, 2023Updated 2 years ago
- NTS proof of concept in Python☆10Jan 1, 2023Updated 3 years ago
- A Binary Ninja plugin that uses bruteforced XFG hashes to recover precise function prototypes☆16Feb 7, 2024Updated 2 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago
- Flask website for implementation of paper on text-based steganography i.e. hiding a secret message in a cover message and sending it over…☆29Feb 28, 2021Updated 5 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Nov 17, 2019Updated 6 years ago
- The EMV QR Code Decoder Library is a Kotlin-based utility that decodes EMV QR codes into structured data. It provides classes and enums t…☆12Apr 13, 2024Updated last year
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- A steganalysis tool for detecting LSB steganography in images☆235Aug 14, 2018Updated 7 years ago
- Konrads' Pen-Ultimate (Windows) Log File Parser☆14Dec 27, 2025Updated 3 months ago
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Coleccion de IRM de Societe Generale traducidos por mí al Español☆35May 12, 2017Updated 8 years ago
- Update an ECS service to use a new Docker image☆13Mar 1, 2026Updated 3 weeks ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- ☆16Oct 12, 2017Updated 8 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago