Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes.
This comprehensive toolkit leverages advanced APIs and data compilation strategies to streamline your investigative workflow.
Whether you’re a security professional or a tech enthusiast, Horus equips you with the necessary tools to elevate your analytical capabilities.
Horus is an all-in-one encompassing tool for investigations assistance, from API leveraging to compiling data too. Its your pre-ops buddy!
To get started with this project, you will need Python installed on your device. Once it is installed, follow these steps:
cd
to the ‘horus’ directory. (Make sure it isn’t the outermost folder)pip install -r requirements.txt
python3 horus.py
on Linux/MacOS, or py horus.py
on WindowsNote: protonvpn-cli is a requirement for the ‘pvpn’ command
To configure the APIs necessary for usage of certain commands, you can either manually enter them, or use the ‘apicon’ command
To manually configure API keys, navigate to /src/modules/var/pipes/api_config.json
. Enter your API keys in their corresponding entries.
⚠️ Warning: If you are contributing to this repository or are testing it through a public fork, make sure to remove your API keys from the JSON file before pushing changes.
🟢 = Fully implemented or more than 80% done
🟡 = Partially implemented / In development
🔴 = To be implemented
For more information click here.
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…