-
#CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis. https://github.com/gchq/CyberChef This is one of those cool#opensource projects any programmer or web developer would find really handy to have in their toolset. -
hxxps://byteout.xyz/olympic/ad/index.html
They aren't loading the rings logo from the http://olympics.org website. Where did it go? #CyberChef reveals all! pic.twitter.com/wy0qifLlMX
Prikaži ovu nit -
Solving the
@StormCTF#shmoocon ticket challenge using#Chepy https://github.com/securisec/chepy#cyberchef#cyber#ctf https://asciinema.org/a/296449 pic.twitter.com/f3aP3CiSHe -
If you've enjoyed learning more about Enigma from
@BletchleyPark this week, have a go for yourself using our#CyberChef Enigma recipe in GitHub You can also try your hand at Bombe and Typex operations - find them all, and more, here:
https://gchq.github.io/CyberChef/
#Enigma80pic.twitter.com/xIJOvz5Q4C
-
When I come across a new thing in
#DFIR that I'm trying to understand,#CyberChef is one of my go-to tools.#DailyDFIR 20: Check out@mattnotmax's list of great CyberChef
recipes for insight (and inspiration!) on what that great tool can do:
https://github.com/mattnotmax/cyberchef-recipes … -
In January to March we:
Kept working during a Dalek takeover
Our Director spoke in #Singapore
Our Centenary plaque was unveiled by The Queen
Added Enigma, Typex & Bombe to #CyberChef
Featured on #WomenTechCharge podcastpic.twitter.com/817flLnS2Y -
Like a nested doll, this
#Python malware has 17 encoded and compressed layers. Hidden inside is an Eternal Blue exploit.
https://gist.github.com/JohnLaTwC/6c9b53b8e2f6074eced6cf573110d83e …
https://www.virustotal.com/gui/file/b454179c13cb4727ae06cc9cd126c3379e2aded5c293af0234ac3312bf9bdad2/detection …
It is no match for the brilliant #CyberChef: https://gchq.github.io/CyberChef pic.twitter.com/UvoJuFFVbW -
#SecurityOnion 16.04.6.3 now available featuring:
#Elastic 6.8.4
#CyberChef 9.11.7
#Bro 2.6.4
#Suricata 4.1.5
#Snort 2.9.15.0 and more! https://blog.securityonion.net/2019/12/security-onion-160463-now-available.html …pic.twitter.com/x5X2Qz0K5f
Prikaži ovu nit -
It has been awhile since I pushed
#CyberChef. I assume most of you have heard about it by now, but there's always at least one that hasn't. It puts complex operations within grasp. I love that you usually can see instant feedback of the output as you build your solution. https://twitter.com/GCHQ/status/1199634217447104514 …
-
Take a look at the new Typex operation in our
#opensource project#CyberChef - it's the first official documentation of this incredible machine
http://gchq.github.io/CyberChef/ pic.twitter.com/AafCjB3LLo
-
I’ve written a guide on how to deobfuscate malicious macros with open source tools. Check it out!
#CyberSecurity#malware#oletools#emotet#cyberchef#staticanalysishttps://newtonpaul.com/static-malware-analysis-with-ole-tools-and-cyber-chef/# … -
Ever wanted to encrypt messages with Enigma and decode them with the Bombe? Give our new features in
#CyberChef a try! https://gchq.github.io/CyberChef/ pic.twitter.com/JkufCMonwD
-
Ahí va mi primera contribución en el blog de
@hackplayers sobre#cyberchef post bastante introductorio pero se irá complicando en los siguientes posts https://www.hackplayers.com/2019/07/usando-cyberchef-parte-i.html … -
Love the return of Cyber Clippy in one of my favorite tools
#CyberChef https://gchq.github.io/CyberChef pic.twitter.com/AiGfry6Mxy
-
Another creative Microsoft.Workflow.Compiler POC: .xoml shellcode loader Pictured:
#CyberChef to quickscope the shellcode (can also confirm with built-in disassembly). Popping calc. "new.xoml" (3/55): https://www.virustotal.com/#/file/768d0f6dafee71c42b9d3827a473dad9aaa7344540afbc344a86f446949d6454/detection …#DailyWorkflow@mattifestationpic.twitter.com/f4gs3hA6ut
Prikaži ovu nit -
Should you *actually* interactively step through static
#DailyScriptlet decoding every time with@GCHQ's#CyberChef?
But is it fun?

Shellcode loader .SCT
Stage 2 shellcode URL in a few seconds with saved recipes

: hxxp://shop.strust[.]club/6rqC (still live!) pic.twitter.com/wIXW5WETGpPrikaži ovu nit -
Here's my monthly plug for
#CyberChef from@GCHQ. This thing paid some serious dividends today. I highly recommend you add it to your toolkit. https://gchq.github.io/CyberChef/ or host your own instance locally or on an enterprise server. -
In case you missed it, 2 new videos were recently released: “Payload Distribution Format” at http://youtube.com/13cubed , and for Patreon supporters, “Cooking with CyberChef” at http://patreon.com/13cubed .
#DFIR#forensics#malware#CyberChef#reverseengineering -
"Cooking with CyberChef” is now available for Patreon supporters. If you aren’t familiar with
#CyberChef, you need to watch this. It’s a seriously awesome tool. Support the channel at http://patreon.com/13cubed .#DFIR#forensics#4n6#malwarepic.twitter.com/f0K9l2t92G
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.