AutoCC
Covert channel analyzer
A tool that automatically discovers covert channels in hardware by analyzing machine states after context switches.
Methodology that leverages FPV to automatically discover covert channels in hardware that is time-shared between processes. AutoCC operates at RTL to exhaustively examine any machine state left by a process after a context switch that creates an execution difference.
14 stars
2 watching
6 forks
Language: Standard ML
last commit: 28 days ago
Linked from 1 awesome list
covert-channelformal-verificationfpvhardwaresecurity
Related projects:
Repository | Description | Stars |
---|---|---|
ssteo/hitbsecconf2021ams-poc | A proof-of-concept demonstrating a covert channel for command and control (C&C) and data exfiltration using AWS GuardDuty in a post-DNS era | 2 |
jpcertcc/aa-tools | A collection of tools and scripts for analyzing malware, reverse engineering malware, and decrypting encrypted data | 455 |
trustedsec/trevorc2 | A tool that enables covert command execution by masking communication through a legitimate website. | 1,225 |
codingo/reconnoitre | Automates reconnaissance and service enumeration of network hosts to gather information and write recommendations for further testing. | 2,110 |
hiddenillusion/analyzepe | Analyzes PE files by combining data from various tools to generate a centralized report. | 204 |
bats3c/shad0w | A post-exploitation toolset designed to operate covertly on heavily monitored environments. | 2,045 |
peek/peek-dalli | A tool to inspect and analyze Memcache commands made through Dalli during application requests | 3 |
secrary/makin | An analysis tool that reveals anti-debugging and anti-VM techniques used by malware samples. | 732 |
objective-see/donotdisturb | Detects unauthorized physical access to laptops and alerts the user. | 294 |
daybr4ak/c2reverseproxy | A tool allowing covert communication between a compromised machine and a command and control server without exposing the machine to the network. | 478 |
snaffcon/snaffler | A tool designed to help pentesters and red teamers find potentially compromised files in large networks by leveraging Active Directory information. | 2,133 |
tomchop/malcom | Analyzes network traffic to detect malware communication and behavior | 1,155 |
3coresec/automata | Automated tool to detect errors in security monitoring and measure effectiveness of SIEM rules against various behaviors. | 50 |
veinsoftheearth/rivgraph | A Python package for converting binary mask of channel networks into a directed graph with various metrics and analysis tools. | 84 |
ledger-donjon/lascar | A Python library designed to facilitate side-channel analysis by providing classes and functions to simplify the process. | 376 |