securisec / chepyLinks
Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
☆998Updated last month
Alternatives and similar repositories for chepy
Users that are interested in chepy are comparing it to the libraries listed below
Sorting:
- A list of cyber-chef recipes and curated links☆2,121Updated last year
- Please no pull requests for this repository. Thanks!☆2,277Updated last month
- High Octane Triage Analysis☆763Updated this week
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,413Updated 4 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,097Updated last year
- RegRipper3.0☆628Updated 7 months ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,140Updated 2 months ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆570Updated last week
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,743Updated 4 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,354Updated 5 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,583Updated 5 months ago
- Hash type identifier (CLI & lib)☆890Updated last week
- ☆1,059Updated last year
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,618Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,459Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,329Updated 2 weeks ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,393Updated this week
- Yet another Stego Tool☆389Updated 2 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆857Updated 4 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,972Updated 4 months ago
- yarGen is a generator for YARA rules☆1,680Updated 4 months ago
- MBC content in markdown☆469Updated last month
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,026Updated 3 weeks ago
- Volatility 3.0 development☆3,327Updated 3 weeks ago
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,715Updated 2 weeks ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,227Updated last month
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,204Updated 2 months ago
- Mimikatz implementation in pure Python☆3,088Updated 2 months ago
- Identify privilege escalation paths within and across different clouds☆698Updated last month
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,167Updated this week