Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
☆1,029Feb 17, 2026Updated last week
Alternatives and similar repositories for chepy
Users that are interested in chepy are comparing it to the libraries listed below
Sorting:
- A list of cyber-chef recipes and curated links☆2,186Jun 14, 2024Updated last year
- High Octane Triage Analysis☆820Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,844Updated this week
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,547Jan 20, 2026Updated last month
- Mimikatz implementation in pure Python☆3,249Jan 2, 2026Updated last month
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,378Dec 23, 2025Updated 2 months ago
- IntelOwl: manage your Threat Intelligence at scale☆4,467Updated this week
- Adversary Emulation Framework☆10,717Feb 23, 2026Updated last week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,897Updated this week
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,313Oct 31, 2025Updated 4 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,336Dec 6, 2025Updated 2 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,452Feb 14, 2026Updated 2 weeks ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,344Feb 19, 2026Updated last week
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆302Dec 27, 2023Updated 2 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,624Dec 13, 2025Updated 2 months ago
- The Swiss Army knife for automated Web Application Testing☆2,322May 8, 2024Updated last year
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,037Updated this week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,054Updated this week
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,439Oct 3, 2025Updated 4 months ago
- Windows Exploit Suggester - Next Generation☆4,766Updated this week
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,600Apr 15, 2025Updated 10 months ago
- Malware Configuration And Payload Extraction☆3,031Updated this week
- The ultimate WinRM shell for hacking/pentesting☆5,260Feb 20, 2026Updated last week
- A collaborative, multi-platform, red teaming framework☆4,318Feb 19, 2026Updated last week
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,389May 1, 2025Updated 10 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,493Updated this week
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,295Feb 14, 2026Updated 2 weeks ago
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated 11 months ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,617Updated this week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,908Jul 6, 2024Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,504Apr 17, 2025Updated 10 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,138Oct 19, 2025Updated 4 months ago
- A machine learning tool that ranks strings based on their relevance for malware analysis.☆752Jan 22, 2026Updated last month
- Loki - Simple IOC and YARA Scanner☆3,726Jan 12, 2026Updated last month
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,167Sep 29, 2021Updated 4 years ago
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated last month
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,874Aug 18, 2023Updated 2 years ago