Chepy is a python library with a handy cli that is aimed to mirror some of the capabilities of CyberChef. A reasonable amount of effort was put behind it to make it compatible to the various functionalities that CyberChef offers, all in a pure Pythonic manner.
There are some key advantages and disadvantages that it has over Cyberchef. The Cyberchef concept of stacking different modules is kept alive in Chepy.
There is still a long way to go for it as it does not offer every single ability of Cyberchef.
Example
For all usage and examples, see the docs.
It has a stacking mechanism similar to Cyberchef. For example, this in Cyberchef:
This is equivalent to
from chepy import Chepy
file_path = “/tmp/demo/encoding”
print(
Chepy(file_path)
.load_file()
.reverse()
.rot_13()
.base64_decode()
.base32_decode()
.hexdump_to_str()
.o
)
Also Read – ShuffleDNS : Wrapper Around Massdns Written In Go To Enumerate Valid Subdomains Using Active Bruteforce
Chepy vs Cyberchef
Advantages
Disadvantages
magic method (at the moment)Installation
It can be installed in a few ways.
Pypi
pip3 install chepy
# optionally with extra requirements
pip3 install chepy[extras]
Git
git clone –recursive https://github.com/securisec/chepy.git
cd chepy
pip3 install -e .
# I use -e here so that if I update later with git pull, I dont have it install it again (unless dependencies have changed)
Docker
docker run –rm -ti -v $PWD:/data securisec/chepy “some string” [somefile, “another string”]
Standalone binary
One can build it to be a standalone binary also. This includes packaging all the dependencies together.
git clone https://github.com/securisec/chepy.git
cd chepy
pip install .
pip install pyinstaller
pyinstaller cli.py –name chepy –onefile
The binary will be in the dist/ folder.
Plugins
Check here for plugins docs
.. toctree::
:maxdepth: 3
:caption: Contents:
usage.md
examples.md
cli.rst
chepy.md
core.md
modules.rst
extras.rst
plugins.md
pullrequest.md
config.md
faq.md
Indices and tables
==================
:ref:genindex
:ref:modindex
:ref:search
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Linux is renowned for its versatility, open-source nature, and security. Whether you're a beginner, developer,…
Cyber insurance helps businesses and individuals mitigate financial losses from data breaches, ransomware, extortion, legal…
Ransomware is one of the most dangerous and destructive forms of cybercrime today. With cybercriminals…
Social media is a key part of our daily lives, with millions of users sharing…
What Are Data Brokers? Data brokers are companies that collect, aggregate, and sell personal information,…