securisec / chepyLinks
Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
☆1,027Updated last month
Alternatives and similar repositories for chepy
Users that are interested in chepy are comparing it to the libraries listed below
Sorting:
- A list of cyber-chef recipes and curated links☆2,181Updated last year
- High Octane Triage Analysis☆806Updated this week
- Please no pull requests for this repository. Thanks!☆2,401Updated 3 weeks ago
- Hash type identifier (CLI & lib)☆936Updated 2 weeks ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,631Updated last month
- RegRipper3.0☆681Updated last year
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,471Updated last month
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,827Updated 4 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,463Updated 10 months ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆591Updated last week
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆878Updated 10 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,524Updated last month
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,398Updated 11 months ago
- Execute ELF files without dropping them on disk☆502Updated last year
- A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.☆1,918Updated 2 years ago
- RDP Bitmap Cache parser☆630Updated last year
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,071Updated last month
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,865Updated this week
- A VBA parser and emulation engine to analyze malicious macros.☆1,118Updated last year
- Extract and Visualize Data from URLs using Unfurl☆709Updated last week
- Yet another Stego Tool☆401Updated 2 years ago
- Mimikatz implementation in pure Python☆3,240Updated last month
- Identify privilege escalation paths within and across different clouds☆714Updated 2 weeks ago
- Convolutional neural network for analyzing pentest screenshots☆1,277Updated last year
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,438Updated 3 months ago
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆636Updated 3 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,262Updated 3 weeks ago
- Sandbox for automated Linux malware analysis.☆485Updated 2 years ago
- ☆1,072Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,475Updated 3 years ago