Discord C2 for Redteam....Need a better name
-
Updated
May 7, 2023 - Go
Discord C2 for Redteam....Need a better name
Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
👋 Stealthy data exfiltration via IPv6 covert channel
A python socks server for tunneling a connection over another channel
A free online class on network information hiding/steganography/covert channels that I teach at the FernUniversität in Hagen, Germany, and HS Worms, Germany.
Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementations based on Flush+Reload and Prime+Probe (L1, LLC) side-channels. Also, some tools and libraries.
Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10
A truly private covert channel over the Telegram
Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.
Setup a AES Encrypted communication Between two machines Right from terminal
Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
Exfiltrate data from a compromised target using covert channels
A PoC on passing data through UNIX file privilege bits (RWX Triplets)
Side-channel file transfer between independent VMs or processes executed on the same physical host.
Methodology that leverages FPV to automatically discover covert channels in hardware that is time-shared between processes. AutoCC operates at RTL to exhaustively examine any machine state left by a process after a context switch that creates an execution difference.
This script has been developed to fulfill a practical work of the subject Network Security I, part of the UBA's Information Security career. It is for academic purposes.
A covert, encrypted and compressed, socket stream that is encoded on top of plaintext HTTP. The plaintext traffic contains an ECDH negotiated key, along with an RC4 cipher stream.
Advanced keylogger and covert channel - for receiving victim's keystrokes and clipboard data. You can send the results to the attacker's Email when the execution is finished, as well as write the digits from the target machine locally to a file
Add a description, image, and links to the covert-channel topic page so that developers can more easily learn about it.
To associate your repository with the covert-channel topic, visit your repo's landing page and select "manage topics."