It's funny looking at some of the contributors to this. Some of the accounts seem to be vague, single-duty accounts made for the express purpose of contributing code to CyberChef and nothing else. I admire their OPSEC
I've been contributing on and off to the project since it went open source (#4 on that page), it's an interesting experience communicating with blank faces that you can't know or find anything about.
Unrelated: About a year in they sent me an award[0] for continued contributions, but there's a puzzle on it I'm yet to solve; if anyone runs across this I'd appreciate any input!
Makes me wonder what GitHub can see (e-mail addresses, IP addresses). I also wonder if it is possible to use code analysis to figure out who these people are. Not that it is relevant for me, just curious...
At first glance, only feature requests I might have added when I did this sort of work would be in for audio spectrographs in the multimedia section. Useful for finding stego, embedded thumbnails, hidden channels etc, and a generalized malicious ZIP parser that deals with the myriad of nasties packers can use.
The demand to scale this capability within an agency like that makes it worth while to build tools like this, wonder whatother easter eggs are in there beyond alert msgs.
This is REALLY cool. Basically given an unknown string or file from something CTF-y you can run this tool on it to look for low-hanging fruit like it being e.g. base64 encoded.
This is a really old reversing trick, for what it's worth; for instance, pulling gzips out of firmware images, or spotting zipped Java images. You can also often identify cryptography primitives from their ASN.1 OID strings. There are a bunch of tools that do stuff like this.
It reminds me of SnD Reverser Tool[1], although compared to this, SnD RT has a bit more constrained scope in what it does, but it's also a standalone exe of just ~150KB. such a shame it's no longer being developed...
Cryptool is similar and I think older. At least I remember that I have used the desktop version in the 90s.
While I appreciate that they made a web version I think they scattered their efforts to create different versions too much so that the project suffered regarding features and quality.
It's fascinating to me (as someone who has written a similar system) that everybody, almost without exception, makes this leap.
If the problem is that clicking is too cumbersome, then add better keyboard support. That's the solution to the problem as stated. You don't need to throw out the whole UI for that, and there's lots of things a GUI can do that a CLI can't.
I haven't been able to determine if this is the common reaction because people simply assume a GUI can't have good keyboard support, or because they're making an excuse for some unstated other reason.
You need to drag specific operation(s) from Operations and drop them into Recipe. And then supply input(s) in Input tab. You can also check the Auto Bake icon in the bottom.
I may be just naive, but I trust and regularly use both Cyberchef and NSA’s Ghidra. I think it’s very unlikely that these tools are backdoored (and Cyberchef runs completely in-browser).
Ok, fair enough, I appreciate the answers to my question - why on earth would I get docked 4 points for asking a question is a mystery though.. whoever you are.
[+] [-] octosphere|6 years ago|reply
(From: https://github.com/gchq/CyberChef/graphs/contributors)
https://github.com/n1474335
https://github.com/j433866
https://github.com/d98762625
https://github.com/s2224834
https://github.com/GCHQ77703
[+] [-] artemisbot|6 years ago|reply
Unrelated: About a year in they sent me an award[0] for continued contributions, but there's a puzzle on it I'm yet to solve; if anyone runs across this I'd appreciate any input!
[0] https://twitter.com/mattnotmitt/status/1031456040385236992
[+] [-] dmix|6 years ago|reply
[+] [-] Fnoord|6 years ago|reply
[+] [-] boarnoah|6 years ago|reply
EDIT: Other thing to note, is you can define, a set of operations, ex: https://gchq.github.io/CyberChef/#recipe=ROT13(true,true,13)
and get a shareable link
[+] [-] motohagiography|6 years ago|reply
At first glance, only feature requests I might have added when I did this sort of work would be in for audio spectrographs in the multimedia section. Useful for finding stego, embedded thumbnails, hidden channels etc, and a generalized malicious ZIP parser that deals with the myriad of nasties packers can use.
The demand to scale this capability within an agency like that makes it worth while to build tools like this, wonder whatother easter eggs are in there beyond alert msgs.
Brits, so cheeky.
[+] [-] malwrar|6 years ago|reply
https://github.com/gchq/CyberChef/wiki/Automatic-detection-o...
This is REALLY cool. Basically given an unknown string or file from something CTF-y you can run this tool on it to look for low-hanging fruit like it being e.g. base64 encoded.
[+] [-] tptacek|6 years ago|reply
[+] [-] downtown_|6 years ago|reply
[+] [-] integricho|6 years ago|reply
[1] https://tuts4you.com/download/1923/
[+] [-] weinzierl|6 years ago|reply
While I appreciate that they made a web version I think they scattered their efforts to create different versions too much so that the project suffered regarding features and quality.
[1] https://www.cryptool.org/en
[+] [-] xwdv|6 years ago|reply
[+] [-] ken|6 years ago|reply
If the problem is that clicking is too cumbersome, then add better keyboard support. That's the solution to the problem as stated. You don't need to throw out the whole UI for that, and there's lots of things a GUI can do that a CLI can't.
I haven't been able to determine if this is the common reaction because people simply assume a GUI can't have good keyboard support, or because they're making an excuse for some unstated other reason.
[+] [-] kim031|6 years ago|reply
[+] [-] ken|6 years ago|reply
It also reminds me of OpenRefine, another very cool online data processing tool with a slightly different focus.
[+] [-] kim031|6 years ago|reply
[+] [-] jdrosenthal|6 years ago|reply
https://gchq.github.io/CyberChef/#recipe=XKCD_Random_Number(... "RFC 1149.5 specifies 4 as the standard IEEE-vetted random number."
[+] [-] flixic|6 years ago|reply
[+] [-] anewguy9000|6 years ago|reply
so is any of the input feeding back to GCHQ?
[+] [-] rtempaccount1|6 years ago|reply
[+] [-] rtempaccount1|6 years ago|reply
[+] [-] NikolaeVarius|6 years ago|reply
[+] [-] lukifer|6 years ago|reply
[+] [-] sdinsn|6 years ago|reply
[+] [-] ixtli|6 years ago|reply
[+] [-] yeahdef|6 years ago|reply
[+] [-] rglover|6 years ago|reply
[+] [-] marctrem|6 years ago|reply
[0] https://hn.algolia.com/?query=cyberchef&sort=byPopularity&pr...
[+] [-] DanBC|6 years ago|reply
[+] [-] myroon5|6 years ago|reply
[+] [-] floki999|6 years ago|reply
[+] [-] invokestatic|6 years ago|reply
[+] [-] United857|6 years ago|reply
[+] [-] cos2pi|6 years ago|reply
[+] [-] unknown|6 years ago|reply
[deleted]
[+] [-] floki999|6 years ago|reply