There are 5 repositories under covert-channel topic.
Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
:wave: Stealthy data exfiltration via IPv6 covert channel
A free online class on network information hiding/steganography/covert channels.
Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube
Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram
A python socks server for tunneling a connection over another channel
Side-channel file transfer between independent VMs or processes executed on the same physical host.
Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementations based on Flush+Reload and Prime+Probe (L1, LLC) side-channels. Also, some tools and libraries.
A PoC on passing data through UNIX file privilege bits (RWX Triplets)
Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
Setup a AES Encrypted communication Between two machines Right from terminal
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
Exfiltrate data from a compromised target using covert channels
Covert Communication using LSB Based Image Steganography in the frequency domain using the DCT transform.
A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels and K-anonymization.
Test covert channels implemented on containers.
C2 framework to rule all framworks
This repo is a collection of proof-of-concepts, examples, essays and experiments in cryptography, cryptanalysis, steganography and covert channels that I originally wrote in 2015.
POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker
A demonstration of a sidechannel vulnerability that exploits cache timings using Flush Reload to communicate information over a covert channel
covert-ml is a GAN-based covert communication method that enables establishing a reliable, undetectable covert channel within autoencoder wireless communication systems with the minimum impact.
AutoFlowLeaker: Circumventing Web Censorship through Automation Services. SRDS 2017
A Pythonic Swiss-Army knife for conducting covert communications over insecure networks, generating encrypted reverse-shells, file transfers, and secure data storage.
Dataset of Hardware-Trojan (HT) based Covert Channels (HT-CCs) for the IEEE 802.11 (WiFi) standard.
LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit