securisec / chepyLinks
Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
☆1,023Updated last month
Alternatives and similar repositories for chepy
Users that are interested in chepy are comparing it to the libraries listed below
Sorting:
- A list of cyber-chef recipes and curated links☆2,150Updated last year
- Please no pull requests for this repository. Thanks!☆2,370Updated 3 weeks ago
- Hash type identifier (CLI & lib)☆922Updated 3 months ago
- High Octane Triage Analysis☆804Updated this week
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,801Updated 4 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,113Updated last year
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,618Updated 9 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,472Updated last month
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,486Updated 2 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,450Updated 8 months ago
- RegRipper3.0☆667Updated last year
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆589Updated 2 months ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,236Updated 6 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,421Updated 9 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,472Updated 3 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆877Updated 8 months ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,248Updated this week
- Identify privilege escalation paths within and across different clouds☆705Updated last month
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,744Updated 4 months ago
- RDP Bitmap Cache parser☆614Updated 10 months ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,055Updated 2 weeks ago
- Mimikatz implementation in pure Python☆3,189Updated last month
- yarGen is a generator for YARA rules☆1,751Updated 2 months ago
- Sandbox for automated Linux malware analysis.☆486Updated 2 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,218Updated 2 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,906Updated 3 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,399Updated 2 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,388Updated 9 months ago
- MBC content in markdown☆503Updated 6 months ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,061Updated 3 weeks ago