You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A java application which takes a file as input and hides it in an image by bit manipulation of RGB and decrypts the text information from the image, has been containerized using Dockerfile (Docker container) built from Openjdk (official) image.
BBIS (Binary-Based Instruction Substitution) is a novel technique to hide data in executables. This is achieved by changing assembly instructions to equivalent instructions in the executable's code according to binary string of the data to hide.
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.