Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes.
This comprehensive toolkit leverages advanced APIs and data compilation strategies to streamline your investigative workflow.
Whether you’re a security professional or a tech enthusiast, Horus equips you with the necessary tools to elevate your analytical capabilities.
Horus is an all-in-one encompassing tool for investigations assistance, from API leveraging to compiling data too. Its your pre-ops buddy!
To get started with this project, you will need Python installed on your device. Once it is installed, follow these steps:
cd
to the ‘horus’ directory. (Make sure it isn’t the outermost folder)pip install -r requirements.txt
python3 horus.py
on Linux/MacOS, or py horus.py
on WindowsNote: protonvpn-cli is a requirement for the ‘pvpn’ command
To configure the APIs necessary for usage of certain commands, you can either manually enter them, or use the ‘apicon’ command
To manually configure API keys, navigate to /src/modules/var/pipes/api_config.json
. Enter your API keys in their corresponding entries.
⚠️ Warning: If you are contributing to this repository or are testing it through a public fork, make sure to remove your API keys from the JSON file before pushing changes.
🟢 = Fully implemented or more than 80% done
🟡 = Partially implemented / In development
🔴 = To be implemented
For more information click here.
BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and…
ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows…
Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability.…
Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They…
FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained…
Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool,…