securisec / chepyLinks
Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
☆1,010Updated last week
Alternatives and similar repositories for chepy
Users that are interested in chepy are comparing it to the libraries listed below
Sorting:
- A list of cyber-chef recipes and curated links☆2,137Updated last year
- High Octane Triage Analysis☆773Updated last week
- Please no pull requests for this repository. Thanks!☆2,322Updated 2 weeks ago
- Hash type identifier (CLI & lib)☆909Updated last month
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,600Updated 7 months ago
- Yet another Stego Tool☆394Updated 2 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,392Updated 7 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,108Updated last year
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆581Updated 2 weeks ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,427Updated 6 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,728Updated 2 weeks ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,442Updated 2 weeks ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,774Updated 4 years ago
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆623Updated 2 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,196Updated 2 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,382Updated 7 months ago
- RegRipper3.0☆647Updated 10 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,893Updated 3 years ago
- Identify privilege escalation paths within and across different clouds☆703Updated last month
- Mimikatz implementation in pure Python☆3,145Updated 3 weeks ago
- Convolutional neural network for analyzing pentest screenshots☆1,248Updated last year
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,188Updated 4 months ago
- Malware Configuration And Payload Extraction☆2,706Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,466Updated 3 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆867Updated 6 months ago
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,727Updated 2 months ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,206Updated last week
- RDP Bitmap Cache parser☆570Updated 8 months ago
- yarGen is a generator for YARA rules☆1,719Updated 6 months ago
- The SpecterOps project management and reporting engine☆1,642Updated this week