securisec / chepy
Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
☆960Updated last month
Alternatives and similar repositories for chepy:
Users that are interested in chepy are comparing it to the libraries listed below
- A list of cyber-chef recipes and curated links☆2,068Updated 9 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,281Updated last week
- Extract credentials from lsass remotely☆2,101Updated 3 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,142Updated 2 months ago
- Mimikatz implementation in pure Python☆2,977Updated last month
- High Octane Triage Analysis☆720Updated this week
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,288Updated last month
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,710Updated 4 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,838Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆3,515Updated last week
- Malware Configuration And Payload Extraction☆2,279Updated this week
- A Python based ingestor for BloodHound☆2,067Updated last month
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,098Updated 2 years ago
- yarGen is a generator for YARA rules☆1,621Updated 9 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,236Updated 11 months ago
- Pentester's Promiscuous Notebook☆487Updated last week
- Fancy reverse and bind shell handler☆2,722Updated 7 months ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,889Updated 3 weeks ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,557Updated last year
- Notes about attacking Jenkins servers☆2,038Updated 8 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,085Updated 3 years ago
- Penelope Shell Handler☆857Updated last week
- A tool to perform Kerberos pre-auth bruteforcing☆2,845Updated 7 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,079Updated 8 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,131Updated last month
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,291Updated 3 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,629Updated 3 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,362Updated this week
- Identify privilege escalation paths within and across different clouds☆684Updated 4 months ago
- Volatility 3.0 development☆2,972Updated this week