Youtube as C2 - Control Windows systems uploading videos to Youtube
-
Updated
Jun 24, 2024 - C#
Youtube as C2 - Control Windows systems uploading videos to Youtube
A free online class on network information hiding/steganography/covert channels that I teach at the FernUniversität in Hagen, Germany, and HS Worms, Germany.
IGMPv3 covert channel: tunnel IP packets through IGMPv3
Covert Communication using LSB Based Image Steganography in the frequency domain using the DCT transform.
Zeek script to detect covert channels created with CCgen.v2
Explore a versatile Python repository enabling seamless steganography across Text, Image, Audio, GIF, and Video formats.
Explore a versatile Python repository enabling seamless steganography across Text, Image, Audio, GIF, and Video formats.
A simple covert channel implemented using python language.
Covert Channel (C2) very simple implementation.
Advanced keylogger and covert channel - for receiving victim's keystrokes and clipboard data. You can send the results to the attacker's Email when the execution is finished, as well as write the digits from the target machine locally to a file
Dataset of Hardware-Trojan (HT) based Covert Channels (HT-CCs) for the IEEE 802.11 (WiFi) standard.
A Pythonic Swiss-Army knife for conducting covert communications over insecure networks, generating encrypted reverse-shells, file transfers, and secure data storage.
A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels and K-anonymization.
Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
Secret Signals. An App that allows users to achieve covert communication.
Test covert channels implemented on containers.
Flush+reload covert channel implementation
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
Methodology that leverages FPV to automatically discover covert channels in hardware that is time-shared between processes. AutoCC operates at RTL to exhaustively examine any machine state left by a process after a context switch that creates an execution difference.
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
Add a description, image, and links to the covert-channel topic page so that developers can more easily learn about it.
To associate your repository with the covert-channel topic, visit your repo's landing page and select "manage topics."