Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for information security steganography
information-security
x
steganography
x
7 search results found
Stegcloak
โญย
3,158
Hide secrets with invisible characters in plain text securely using passwords ๐ง๐ปโโ๏ธโญ
Cloakify
โญย
1,483
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Information Security Tasks
โญย
162
This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Sec Pentesting Toolkit
โญย
133
๐พ ๐๐ผ๐ผ๐น๐ ๐ณ๐ผ๐ฟ ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฟ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต๐ฒ๐ฟ๐: ๐ฝ๐ฒ๐ป๐๐ฒ๐๐๐ถ๐ป๐ด, ๐๐ง๐๐ & ๐๐ฎ๐ฟ๐ด๐ฎ๐บ๐ฒ๐
Network Covert Channels A University Level Course
โญย
74
A free online class on network information hiding/steganography/covert channels that I teach at the FernUniversitรคt in Hagen, Germany, and HS Worms, Germany.
Nefias
โญย
24
Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection
Istego100k
โญย
23
IStego100K: Large-scale Image Steganalysis Dataset
Networkcovertchannels
โญย
9
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
Cceap
โญย
9
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
Stegano
โญย
9
Information Security using Steganography over Cryptography
Ethical Hacking Study
โญย
5
Ethical Hacking - Useful Resources
Related Searches
Python Steganography (364)
Python Information Security (342)
Penetration Testing Information Security (281)
1-7 of 7 search results
Privacy
ย |ย
About
ย |ย
Terms
ย |ย
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source.ย All rights reserved.