No project description provided
Project description
ThreatHunter
A python malware detection, analysis and reverse ngineering toolkit. This is a Linux command-line interface (CLI) utility that use YARA , Capstone ,Redare2 among otheres to detect analyze and reverse engineer malware. This is still a work in progress version, great things are underway.
Installation
-
Install via pip:
pip install ThreatHunter
-
Install from github:
pip install git+https://github.com/skye-cyber/ThreatHunter.git
Usage
To run the CLI app, use the following command:
ThreatHunter [option]
Replace [options]
with the appropriate command-line options.
Available Options
-p/--path
:path to directory or file to scan-v/--verbose
: Show all infor. By default screen clering is on so only one line of output show per time, pass verbose to prevent screen cleaning. verbose mode can be useful when work to e done is minimal
Examples
-
Example command 1:
ThreatHunter -p /home/user/Documents/
ThreatHunter -p /home/user/Documents/ -v
The toolkit will scan all the files and folder in the /home/user/Documents/
directory and it's nested
files and folders to the last child.
-p
also accepts file input
- Scan working directory
ThreatHunter
ThreatHunter -v
Giving no option as in the above case, the toolkit will recursively scan the current directory (working directory)
Adding rule(s) to the existing rules
ThreatHunter --add @foo
where @foo
is the rule file, folder or even rule in text form
Using exclusive rule
You may also want to rune scan using a given rule only, that case, you can follow this format
ThreatHunter --use @foo -p
where @foo
is the rule file, folder or rule itself.
if -u/--use
is used, then -p/--path
must be provided
Contributing
Feel free to submit any suggestions!
Contributions are welcome! If you encounter any issues or have suggestions for improvements, please open an issue or submit a pull request.
License
This project is an open source software. Under GPL-3.0 license
Feel free to modify and customize this template according to your specific project requirements and add any additional sections or information that you think would be helpful for users.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file ThreatHunter-1.1.4.tar.gz
.
File metadata
- Download URL: ThreatHunter-1.1.4.tar.gz
- Upload date:
- Size: 1.5 MB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.11.9
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 2e08ab6ed938c962aee66a682fb95d9d5a151f2f748d3d9fb1128cdb68575106 |
|
MD5 | c95bd50b825598d850673451c554a0cb |
|
BLAKE2b-256 | e9511f0b733bb0c1e17de1bfe417bd86e4de421866f1eee2e29888512877d507 |
File details
Details for the file ThreatHunter-1.1.4-py3-none-any.whl
.
File metadata
- Download URL: ThreatHunter-1.1.4-py3-none-any.whl
- Upload date:
- Size: 12.7 MB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.11.9
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | ae426628e148554484c7e38e02d833a4f5e8b04c6a81f1e3739020ba7379e31c |
|
MD5 | bcb51eaa6f1a6516e784a5c491a900b0 |
|
BLAKE2b-256 | ae5a602685fbadf672ebca36a73e6464c926331654c986791bde49e0069404d0 |