☆16Mar 22, 2023Updated 3 years ago
Alternatives and similar repositories for CyberChef
Users that are interested in CyberChef are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 3 years ago
- A set of Splunk workflow action definitions to export field values to CyberChef for further analysis.☆13Jan 22, 2018Updated 8 years ago
- A Python package to decrypt Google Pay tokens.☆13Aug 12, 2021Updated 4 years ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆49Feb 27, 2026Updated 2 months ago
- Random experiments and shenanigans☆13Dec 6, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- RE for champions☆15May 11, 2026Updated last week
- Remote Thread Detection with a Kernel Driver☆35Jan 14, 2025Updated last year
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- Mount VSCs with ease!☆18Apr 28, 2026Updated 3 weeks ago
- Plugins for parsing CSV files in Timeline Explorer. This project allows for anyone to add more supported files (i,e. they get a Line #/ta…☆33May 11, 2026Updated last week
- ☆12Aug 27, 2025Updated 8 months ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- ☆19Dec 4, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Extract crypt database from Google Drive and decrypt it.☆20Jul 12, 2021Updated 4 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- ☆17Feb 15, 2022Updated 4 years ago
- Detect BypassUAC using AMSI☆30Feb 18, 2025Updated last year
- CyberChef API MCP Server ✨🧑🍳☆39Apr 3, 2026Updated last month
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 7 years ago
- Yara Rules for Modern Malware☆80Mar 3, 2024Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 5 months ago
- ☆22Jan 31, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Aug 19, 2022Updated 3 years ago
- A minimal CLI client for CRXcavator.io☆15Dec 8, 2022Updated 3 years ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆21Mar 27, 2024Updated 2 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- Log Entry to Sigma Rule Converter☆107Mar 3, 2022Updated 4 years ago
- DTrace for Windows in userspace; Frontend to ETW☆27Oct 4, 2022Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- static malware analysis and report tool open source version for linux☆17Jun 17, 2017Updated 8 years ago
- Repo to track SANS BlueTeam Summit Presentation☆23Oct 4, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 4 years ago
- Simple PowerShell script to enable process scanning with Yara.☆100Oct 4, 2022Updated 3 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆120Apr 8, 2023Updated 3 years ago
- 🕵️♀️ Find, locate, and query files for ops and security experts ⚡️⚡️⚡️☆36Dec 18, 2022Updated 3 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Nov 30, 2025Updated 5 months ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Windows forensics Engine☆89May 10, 2026Updated last week