There are 5 repositories under covert-channel topic.
C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.
Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
:wave: Stealthy data exfiltration via IPv6 covert channel
A free online class on network information hiding/steganography/covert channels.
Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube
Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram
A python socks server for tunneling a connection over another channel
Side-channel file transfer between independent VMs or processes executed on the same physical host.
Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementations based on Flush+Reload and Prime+Probe (L1, LLC) side-channels. Also, some tools and libraries.
A PoC on passing data through UNIX file privilege bits (RWX Triplets)
Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
Methodology that leverages FPV to automatically discover covert channels in hardware that is time-shared between processes. AutoCC operates at RTL to exhaustively examine any machine state left by a process after a context switch that creates an execution difference.
Setup a AES Encrypted communication Between two machines Right from terminal
Exfiltrate data from a compromised target using covert channels
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
Covert Communication using LSB Based Image Steganography in the frequency domain using the DCT transform.
A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels and K-anonymization.
Test covert channels implemented on containers.
POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker
C2 framework to rule all framworks
This repo is a collection of proof-of-concepts, examples, essays and experiments in cryptography, cryptanalysis, steganography and covert channels that I originally wrote in 2015.
A covert, encrypted and compressed, socket stream that is encoded on top of plaintext HTTP. The plaintext traffic contains an ECDH negotiated key, along with an RC4 cipher stream.
covert-ml is a GAN-based covert communication method that enables establishing a reliable, undetectable covert channel within autoencoder wireless communication systems with the minimum impact.
A demonstration of a sidechannel vulnerability that exploits cache timings using Flush Reload to communicate information over a covert channel
Dataset of Hardware-Trojan (HT) based Covert Channels (HT-CCs) for the IEEE 802.11 (WiFi) standard.
Network Environment Learning (NEL) Phase for Covert Channels (with a Feedback Channel)
AutoFlowLeaker: Circumventing Web Censorship through Automation Services. SRDS 2017
LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit