Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
☆1,035Mar 14, 2026Updated last week
Alternatives and similar repositories for chepy
Users that are interested in chepy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of cyber-chef recipes and curated links☆2,195Jun 14, 2024Updated last year
- High Octane Triage Analysis☆830Updated this week
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆302Dec 27, 2023Updated 2 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,890Updated this week
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,653Mar 11, 2026Updated 2 weeks ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,454Updated this week
- Mimikatz implementation in pure Python☆3,257Jan 2, 2026Updated 2 months ago
- Adversary Emulation Framework☆10,877Updated this week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,923Mar 17, 2026Updated last week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,484Mar 2, 2026Updated 3 weeks ago
- IntelOwl: manage your Threat Intelligence at scale☆4,505Updated this week
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,323Oct 31, 2025Updated 4 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,384Mar 16, 2026Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,362Feb 19, 2026Updated last month
- A machine learning tool that ranks strings based on their relevance for malware analysis.☆754Mar 11, 2026Updated last week
- PowerShell script for deobfuscating encoded PowerShell scripts☆435Feb 4, 2021Updated 5 years ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,062Feb 24, 2026Updated last month
- Windows Events Attack Samples☆2,526Jan 24, 2023Updated 3 years ago
- Malware Configuration And Payload Extraction☆3,082Updated this week
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,624Dec 13, 2025Updated 3 months ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,300Feb 14, 2026Updated last month
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,616Apr 15, 2025Updated 11 months ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,435May 1, 2025Updated 10 months ago
- Windows Exploit Suggester - Next Generation☆4,789Mar 13, 2026Updated last week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,085Feb 25, 2026Updated last month
- A server providing RESTful access to CyberChef☆168Feb 28, 2026Updated 3 weeks ago
- The Swiss Army knife for automated Web Application Testing☆2,321May 8, 2024Updated last year
- Trying to tame the three-headed dog.☆4,935Nov 14, 2025Updated 4 months ago
- Loki - Simple IOC and YARA Scanner☆3,733Jan 12, 2026Updated 2 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,362Sep 22, 2025Updated 6 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,518Apr 17, 2025Updated 11 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,539Updated this week
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated last year
- A collaborative, multi-platform, red teaming framework☆4,372Updated this week