Cyber security

CyberChef Server – A Comprehensive Guide To Setting Up And Using A CyberChef API

CyberChef has a useful Node.js API, but sometimes we want to be able to programmatically run CyberChef recipes in languages other than JavaScript.

By running this server, you can use CyberChef operations in any language, as long as you can communicate via HTTP.

Example Use

Assuming you’ve downloaded the repository and are running it locally:

curl -X POST -H "Content-Type:application/json" -d '{"input":"... ---:.-.. --- -. --. --..--:.- -. -..:- .... .- -. -.- ...:..-. --- .-.:.- .-.. .-..:- .... .:..-. .. ... ....", "recipe":{"op":"from morse code", "args": {"wordDelimiter": "Colon"}}}' localhost:3000/bake

response

{
    value: "SO LONG, AND THANKS FOR ALL THE FISH",
    type: "string"
}

Features

  • Compatible with recipes saved from CyberChef. After using CyberChef to experiment and find a suitable recipe, the exported recipe JSON can be used to post to the /bake endpoint. Just copy/paste it in as your recipe property as part of the POST body.

Installing

  • Clone the repository
  • cd into the project and run npm install
  • Run npm run
  • In a browser, navigate to localhost:3000 to see usage documentation.

Docker

A Docker image can be built, then run by doing the following:

  • git clone https://github.com/gchq/CyberChef-server
  • cd CyberChef-server
  • docker build -t cyberchef-server .
  • docker run -it --rm --name=cyberchef-server -p 3000:3000 cyberchef-server

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

evilrdp : The Ultimate Tool For Elevated RDP Command Control

In the realm of remote desktop management, evilrdp stands out as a powerful tool designed…

2 hours ago

wa-tunnel – TCP Tunneling Through Whatsapp

wa-tunnel is an innovative tool designed to tunnel TCP data through two WhatsApp accounts, leveraging…

2 hours ago

Deepfake Apps : How They Function And Their Applications

Deepfake apps are sophisticated tools that utilize advanced AI algorithms, particularly Generative Adversarial Networks (GANs),…

2 hours ago

Subdominator – Unleash The Power Of Subdomain Enumeration

Subdominator is a lightweight and fast tool designed for passive subdomain enumeration, primarily used in…

2 hours ago

Doing The Due Diligence : Analyzing The Next.js Middleware Bypass (CVE-2025-29927)

A critical vulnerability, CVE-2025-29927, has recently been identified in the Next.js ecosystem, allowing attackers to…

3 hours ago

Awesome-Redteam : A Comprehensive Guide To Advanced Red Teaming Tools And Techniques

The Awesome-Redteam repository is a comprehensive collection of tools and resources designed for red teaming…

6 hours ago