Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
-
Updated
Dec 28, 2023 - Python
Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
👋 Stealthy data exfiltration via IPv6 covert channel
Discord C2 for Redteam....Need a better name
A free online class on network information hiding/steganography/covert channels that I teach at the FernUniversität in Hagen, Germany, and HS Worms, Germany.
Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram
A python socks server for tunneling a connection over another channel
Youtube as C2 - Control Windows systems uploading videos to Youtube
Side-channel file transfer between independent VMs or processes executed on the same physical host.
Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementations based on Flush+Reload and Prime+Probe (L1, LLC) side-channels. Also, some tools and libraries.
Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10
A truly private covert channel over the Telegram
A PoC on passing data through UNIX file privilege bits (RWX Triplets)
Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
Setup a AES Encrypted communication Between two machines Right from terminal
Covert Communication using LSB Based Image Steganography in the frequency domain using the DCT transform.
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
Exfiltrate data from a compromised target using covert channels
A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels and K-anonymization.
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
Add a description, image, and links to the covert-channel topic page so that developers can more easily learn about it.
To associate your repository with the covert-channel topic, visit your repo's landing page and select "manage topics."