DidierStevensSuite
CyberChef
Our great sponsors
DidierStevensSuite | CyberChef | |
---|---|---|
7 | 286 | |
1,827 | 25,384 | |
- | 3.8% | |
5.6 | 8.8 | |
19 days ago | 5 days ago | |
Python | JavaScript | |
- | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
DidierStevensSuite
-
Request: DidierStevens, I need a simple guide on how to scan pdf's for malware, I want to specifically make sure I include/implement all of DidierStevens additions to antivirus detection/research.
Didier Stevens is a famous security researcher, but his instructions on how to scan pdf's require the terminal & many commands. I am hostile to this in general as I think it can all be implemented in a simple one click scan tool, instead. Which is what I am looking for. Here are all his relevant links & antivirus/anti-malware projects & tutorials: https://github.com/DidierStevens/DidierStevensSuite
-
The Pdfalyzer is a tool for visualizing the inner tree structure of a PDF in large and colorful diagrams as well as scanning its internals for suspicious content
This tool was built to fill a gap in the PDF assessment landscape. Didier Stevens's pdfid.py and pdf-parser.py are still the best game in town when it comes to PDF analysis tools but they lack in the visualization department and also don't give you much to work with as far as giving you a data model you can write your own code around. Peepdf seemed promising but turned out to be in a buggy, out of date, and more or less unfixable state. And neither of them offered much in the way of tooling for embedded binary analysis. Thus I felt the world might be slightly improved if I strung together a couple of more stable/well known/actively maintained open source projects (AnyTree, PyPDF2, and Rich) into this tool.
-
[EXCEL] macro recorder and macros that use other macros: any way to avoid fully qualified names?
OK then. So I won't accidentally miss any, I've made a little script to find them. It uses oledump.py which, as the name suggests is a Python script to dump OLE files. Here is oledump.py on Github. Excel stores its macros in an OLE file names xl/vbaProject.bin inside the .xlsm file, and oledump knows how to find that, list the streams in them, and extract the macros from the streams that contain them.
-
Extracting attachments from saved emails (.eml)
You can install emldump and programmatically extract all attachments
-
What's in your toolkit?
Didier Stevens Suite - He has a tool for everything.
CyberChef
-
PicoCTF 2024: packer
Then we take the encrypted text and use CyberChef to decrypt it.
-
Unbreakable 2024: secrets-of-winter
Let's go to CyberChef and insert our pieces of evidence.
-
YouTube: Google has found a way to break Invidious
A parameter was changed from '2AMBCgIQBg' to 'CgIIAdgDAQ%3D%3D' which is just the correct base64 encoding they should have been using the entire time.
I don't think this was a hostile action by Google, I think someone just added better input validation for security reasons and it accidently broke the bad requests they were sending.
https://gchq.github.io/CyberChef/#recipe=URL_Decode()From_Ba...
-
PicoCTF 2024- CanYouSee
❗This is indeed the flag, but the text is encrypted with Base64. Usually, the presence of padding character "=" indicates that's Base64 type of encoding (but that's only one of the hints). To decrypt it, we can use CyberChef. Copy-paste the text and we either:
-
CyberChef VS DevToolboxWeb - a user suggested alternative
2 projects | 6 Feb 2024
-
CyberChef from GCHQ: The Cyber Swiss Army Knife
It uses a combination of magic bytes (like the `file` command), entropy analysis and character frequency detection to determine whether an output is likely to be of interest to the user.
The file type mechanism is written here[0]. There's a list of all signatures we detect here[1].
[0] https://github.com/gchq/CyberChef/blob/master/src/core/lib/F...
- Show HN: File Hider
- UK GCHQ's CyberChef
-
Lets try this again. Got a code for you to break.
I think this can be deciphered using CyberChef...
- CyberChef is a useful tool for decoding information.
What are some alternatives?
dislocker - FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX
QR-Code-generator - High-quality QR Code generator library in Java, TypeScript/JavaScript, Python, Rust, C++, C.
TheHive - TheHive: a Scalable, Open Source and Free Security Incident Response Platform
CapRover - Scalable PaaS (automated Docker+nginx) - aka Heroku on Steroids
Serpico - SimplE RePort wrIting and COllaboration tool
py4e - Web site for www.py4e.com and source to the Python 3.0 textbook
treblle-node - The official Treblle SDK for NodeJS/ExpressJS. Seamlessly integrate Treblle to manage communication with your dashboard, send errors, and secure sensitive data.
cyberchef-recipes - A list of cyber-chef recipes and curated links
Feedly-Backup - Backup of my feedly... feeds
Ciphey - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
postman-app-support - Postman is an API platform for building and using APIs. Postman simplifies each step of the API lifecycle and streamlines collaboration so you can create better APIs—faster.
Monica - Personal CRM. Remember everything about your friends, family and business relationships.