Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes.
This comprehensive toolkit leverages advanced APIs and data compilation strategies to streamline your investigative workflow.
Whether you’re a security professional or a tech enthusiast, Horus equips you with the necessary tools to elevate your analytical capabilities.
Horus is an all-in-one encompassing tool for investigations assistance, from API leveraging to compiling data too. Its your pre-ops buddy!
To get started with this project, you will need Python installed on your device. Once it is installed, follow these steps:
cd
to the ‘horus’ directory. (Make sure it isn’t the outermost folder)pip install -r requirements.txt
python3 horus.py
on Linux/MacOS, or py horus.py
on WindowsNote: protonvpn-cli is a requirement for the ‘pvpn’ command
To configure the APIs necessary for usage of certain commands, you can either manually enter them, or use the ‘apicon’ command
To manually configure API keys, navigate to /src/modules/var/pipes/api_config.json
. Enter your API keys in their corresponding entries.
⚠️ Warning: If you are contributing to this repository or are testing it through a public fork, make sure to remove your API keys from the JSON file before pushing changes.
🟢 = Fully implemented or more than 80% done
🟡 = Partially implemented / In development
🔴 = To be implemented
For more information click here.
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…