analyzing-network-covert-channels-in-malware
mukul975/Anthropic-Cybersecurity-Skills
Detects DNS tunneling, ICMP exfiltration, HTTP steganography, and other protocol abuses used by malware for covert C2 or data theft, guiding analysts through scanning PCAPs, scoring domains, and flagging anomalous flows in incident response.