androguard
CyberChef
androguard | CyberChef | |
---|---|---|
1 | 294 | |
5,194 | 28,529 | |
1.6% | 2.1% | |
8.4 | 9.1 | |
5 days ago | about 1 month ago | |
Python | JavaScript | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
androguard
-
Awesome CTF : Top Learning Resource Labs
Androguard - Reverse engineer Android applications.
CyberChef
- CyberChef – The Cyber Swiss Army Knife
-
DevHub.app – Developer Utilities for macOS
Curiously, there is a similar tool made by GCHQ (UK's intelligence) https://github.com/gchq/CyberChef which I don't use neither because I don't use because of trust issues, even though it's open source
-
Open-source utils for devs who don't like ads
There's a lot of CyberChef hosted domains that aren't hosted by GCHQ. It's open source, so they're doing nothing wrong, but we can't provide assurances about the code on those sites. The official URL is https://github.com/gchq/CyberChef.
-
TOTP tokens on my wrist with the smartest dumb watch
Example recipe to do it for you:
https://gchq.github.io/CyberChef/#recipe=To_Upper_case('All'...')
It looks like 'cryptii' also appears to do all processing client-side.
-
Try Hack Me: Friday Overtime Complete Write-up 👾
Now we need to find a URL connected to 2020–11–02, and defang it on CyberChef. Defanging URLs and IPs is a critical practice for safely sharing potentially harmful links, and CyberChef simplifies this process, especially when handling large volumes of data. This practice is essential when sharing resources that might contain harmful data.
-
Show HN: VS Code Extension to skip the noisy web tools (JSON Prettify, and more)
There is also IT-Tools and CyberChef. Selfhost-able projects to create your own instance of "online utilities tools"
https://gchq.github.io/CyberChef/
https://it-tools.tech/
-
PicoCTF 2024: packer
Then we take the encrypted text and use CyberChef to decrypt it.
-
Unbreakable 2024: secrets-of-winter
Let's go to CyberChef and insert our pieces of evidence.
-
YouTube: Google has found a way to break Invidious
A parameter was changed from '2AMBCgIQBg' to 'CgIIAdgDAQ%3D%3D' which is just the correct base64 encoding they should have been using the entire time.
I don't think this was a hostile action by Google, I think someone just added better input validation for security reasons and it accidently broke the bad requests they were sending.
https://gchq.github.io/CyberChef/#recipe=URL_Decode()From_Ba...
-
PicoCTF 2024- CanYouSee
❗This is indeed the flag, but the text is encrypted with Base64. Usually, the presence of padding character "=" indicates that's Base64 type of encoding (but that's only one of the hints). To decrypt it, we can use CyberChef. Copy-paste the text and we either:
What are some alternatives?
Apktool - A tool for reverse engineering Android apk files
QR-Code-generator - High-quality QR Code generator library in Java, TypeScript/JavaScript, Python, Rust, C++, C.
fibratus - Adversary tradecraft detection, protection, and hunting
CapRover - Scalable PaaS (automated Docker+nginx) - aka Heroku on Steroids
apk2gold - CLI tool for decompiling Android apps to Java. It does resources! It does Java! Its real easy!
py4e - Web site for www.py4e.com and source to the Python 3.0 textbook
jadx - Dex to Java decompiler
cyberchef-recipes - A list of cyber-chef recipes and curated links
z3 - The Z3 Theorem Prover
Ciphey - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
hellomello - Experiments with writing Android apps in Nim
Monica - Personal CRM. Remember everything about your friends, family and business relationships.