The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
☆34,661Apr 25, 2026Updated this week
Alternatives and similar repositories for CyberChef
Users that are interested in CyberChef are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,365Updated this week
- Ghidra is a software reverse engineering (SRE) framework☆67,465Apr 19, 2026Updated last week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,041Apr 18, 2026Updated last week
- A little tool to play with Windows security☆21,464Apr 17, 2026Updated last week
- 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.☆53,210Updated this week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆21,341Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆28,013Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆15,655Updated this week
- CTF framework and exploit development library☆13,391Apr 19, 2026Updated last week
- An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.☆43,232Apr 19, 2026Updated last week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,729Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,113Apr 18, 2026Updated last week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,556Updated this week
- Find, verify, and analyze leaked credentials☆25,895Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Fast web fuzzer written in Go☆15,928Apr 24, 2025Updated last year
- Six Degrees of Domain Admin☆10,529Mar 2, 2026Updated last month
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,945Updated this week
- Metasploit Framework☆37,978Updated this week
- The fastest path to AI-powered full stack observability, even for lean teams.☆78,551Updated this week
- Pre-Built Vulnerable Environments Based on Docker-Compose☆20,557Updated this week
- 🤖 The Modern Port Scanner 🤖☆19,643Updated this week
- Free and Open Source Reverse Engineering Platform powered by rizin☆18,681Apr 19, 2026Updated last week
- A list of Free Software network services and web applications which can be hosted on your own servers☆287,497Apr 18, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A swiss army knife for pentesting networks☆9,123Dec 6, 2023Updated 2 years ago
- Web path scanner☆14,188Mar 16, 2026Updated last month
- World's fastest and most advanced password recovery utility☆25,837Feb 20, 2026Updated 2 months ago
- In-depth attack surface mapping and asset discovery☆14,463Apr 17, 2026Updated last week
- 🗃 Open source self-hosted web archiving. Takes URLs/browser history/bookmarks/Pocket/Pinboard/etc., saves HTML, JS, PDFs, media, and mor…☆27,279Updated this week
- Hunt down social media accounts by username across social networks☆82,092Updated this week
- UNIX-like reverse engineering framework and command-line toolset☆23,502Updated this week
- The pattern matching swiss knife☆9,563Feb 10, 2026Updated 2 months ago
- Automatic SQL injection and database takeover tool☆37,127Apr 17, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,953Aug 17, 2020Updated 5 years ago
- An advanced memory forensics framework☆8,002May 16, 2025Updated 11 months ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆110,861Updated this week
- Open-Source Phishing Toolkit☆13,779Sep 23, 2024Updated last year
- Directory/File, DNS and VHost busting tool written in Go☆13,638Updated this week
- Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS☆71,712Updated this week
- Open-Source API Development Ecosystem • https://hoppscotch.io • Offline, On-Prem & Cloud • Web, Desktop & CLI • Open-Source Alternative t…☆79,025Updated this week