Skip to main content

No project description provided

Project description

ThreatHunter

A python malware detection, analysis and reverse ngineering toolkit. This is a Linux command-line interface (CLI) utility that use YARA , Capstone ,Redare2 among otheres to detect analyze and reverse engineer malware. This is still a work in progress version, great things are underway.

Installation

  1. Install via pip:

    pip install ThreatHunter
    
  2. Install from github:

    pip install git+https://github.com/skye-cyber/ThreatHunter.git
    

Usage

To run the CLI app, use the following command:

ThreatHunter [option]

Replace [options] with the appropriate command-line options.

Available Options

  • -p/--path:path to directory or file to scan
  • -v/--verbose: Show all infor. By default screen clering is on so only one line of output show per time, pass verbose to prevent screen cleaning. verbose mode can be useful when work to e done is minimal

Examples

  1. Example command 1:

    ThreatHunter -p /home/user/Documents/
    
    ThreatHunter -p /home/user/Documents/ -v
    

The toolkit will scan all the files and folder in the /home/user/Documents/ directory and it's nested files and folders to the last child. -p also accepts file input

  1. Scan working directory
    ThreatHunter
    
    ThreatHunter -v
    

Giving no option as in the above case, the toolkit will recursively scan the current directory (working directory)

Adding rule(s) to the existing rules

ThreatHunter --add @foo

where @foo is the rule file, folder or even rule in text form

Using exclusive rule

You may also want to rune scan using a given rule only, that case, you can follow this format

ThreatHunter --use @foo -p

where @foo is the rule file, folder or rule itself. if -u/--use is used, then -p/--path must be provided

Contributing

Feel free to submit any suggestions!

Contributions are welcome! If you encounter any issues or have suggestions for improvements, please open an issue or submit a pull request.

License

This project is an open source software. Under GPL-3.0 license

Feel free to modify and customize this template according to your specific project requirements and add any additional sections or information that you think would be helpful for users.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ThreatHunter-1.1.4.tar.gz (1.5 MB view details)

Uploaded Source

Built Distribution

ThreatHunter-1.1.4-py3-none-any.whl (12.7 MB view details)

Uploaded Python 3

File details

Details for the file ThreatHunter-1.1.4.tar.gz.

File metadata

  • Download URL: ThreatHunter-1.1.4.tar.gz
  • Upload date:
  • Size: 1.5 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.11.9

File hashes

Hashes for ThreatHunter-1.1.4.tar.gz
Algorithm Hash digest
SHA256 2e08ab6ed938c962aee66a682fb95d9d5a151f2f748d3d9fb1128cdb68575106
MD5 c95bd50b825598d850673451c554a0cb
BLAKE2b-256 e9511f0b733bb0c1e17de1bfe417bd86e4de421866f1eee2e29888512877d507

See more details on using hashes here.

File details

Details for the file ThreatHunter-1.1.4-py3-none-any.whl.

File metadata

  • Download URL: ThreatHunter-1.1.4-py3-none-any.whl
  • Upload date:
  • Size: 12.7 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.11.9

File hashes

Hashes for ThreatHunter-1.1.4-py3-none-any.whl
Algorithm Hash digest
SHA256 ae426628e148554484c7e38e02d833a4f5e8b04c6a81f1e3739020ba7379e31c
MD5 bcb51eaa6f1a6516e784a5c491a900b0
BLAKE2b-256 ae5a602685fbadf672ebca36a73e6464c926331654c986791bde49e0069404d0

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page