Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
-
Updated
Dec 28, 2023 - Python
Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.
Discord C2 for Redteam....Need a better name
👋 Stealthy data exfiltration via IPv6 covert channel
A free online class on network information hiding/steganography/covert channels.
Youtube as C2 channel - Control Windows systems uploading videos to Youtube
Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram
A python socks server for tunneling a connection over another channel
Side-channel file transfer between independent VMs or processes executed on the same physical host.
Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementations based on Flush+Reload and Prime+Probe (L1, LLC) side-channels. Also, some tools and libraries.
Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10
A PoC on passing data through UNIX file privilege bits (RWX Triplets)
A truly private covert channel over the Telegram
Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
Setup a AES Encrypted communication Between two machines Right from terminal
Exfiltrate data from a compromised target using covert channels
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
Methodology that leverages FPV to automatically discover covert channels in hardware that is time-shared between processes. AutoCC operates at RTL to exhaustively examine any machine state left by a process after a context switch that creates an execution difference.
Covert Communication using LSB Based Image Steganography in the frequency domain using the DCT transform.
Add a description, image, and links to the covert-channel topic page so that developers can more easily learn about it.
To associate your repository with the covert-channel topic, visit your repo's landing page and select "manage topics."