Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Translations
🇩🇪 DE
🇫🇷 FR
🇭🇺 HU
🇮🇩 ID
🇮🇹 IT
🇳🇱 NL
🇧🇷 PT-BR
🇷🇺 RU
🇨🇳 ZH
➡️
Documentation |
Discord |
Installation Guide
⬅️
Fully automated decryption/decoding/cracking tool using natural language processing & artificial intelligence, along with some common sense.
python3 -m pip install ciphey --upgrade | docker run -it --rm remnux/ciphey | sudo port install ciphey |
Linux | Mac OS | Windows |
---|---|---|
Input encrypted text, get the decrypted text back.
"What type of encryption?"
That's the point. You don't know, you just know it's possibly encrypted. Ciphey will figure it out for you.
Ciphey can solve most things in 3 seconds or less.
Ciphey aims to be a tool to automate a lot of decryptions & decodings such as multiple base encodings, classical ciphers, hashes or more advanced cryptography.
If you don't know much about cryptography, or you want to quickly check the ciphertext before working on it yourself, Ciphey is for you.
The technical part. Ciphey uses a custom built artificial intelligence module (AuSearch) with a Cipher Detection Interface to approximate what something is encrypted with. And then a custom-built, customisable natural language processing Language Checker Interface, which can detect when the given text becomes plaintext.
No neural networks or bloated AI here. We only use what is fast and minimal.
And that's just the tip of the iceberg. For the full technical explanation, check out our documentation.
Name | ⚡ Ciphey ⚡ | 🐢 CyberChef 🐢 |
---|---|---|
Gif | ||
Time | 2 seconds | 6 seconds |
Setup |
|
|
Note The gifs may load at different times, so one may appear significantly faster than another.
A note on magic CyberChef's most similar feature to Ciphey is Magic. Magic fails instantly on this input and crashes. The only way we could force CyberChef to compete was to manually define it.
We also tested CyberChef and Ciphey with a 6gb file. Ciphey cracked it in 5 minutes and 54 seconds. CyberChef crashed before it even started.
Name | ⚡ Ciphey ⚡ | 🗡️ Katana 🗡️ | 🐢 CyberChef Magic 🐢 |
---|---|---|---|
Advanced Language Checker | ✅ | ❌ | ✅ |
Supports Encryptions | ✅ | ✅ | ❌ |
Releases named after Dystopian themes 🌃 | ✅ | ❌ | ❌ |
Supports hashes | ✅ | ✅ | ❌ |
Easy to set up | ✅ | ❌ | ✅ |
Can guess what something is encrypted with | ✅ | ❌ | ❌ |
Created for hackers by hackers | ✅ | ✅ | ❌ |
If you're having trouble with installing Ciphey, read this.
Installation Guide | Documentation | Discord | Docker Image (from REMnux) |
---|---|---|---|
📖 Installation Guide | 📚 Documentation | 🦜 Discord | 🐋 Docker Documentation |
There are 3 ways to run Ciphey.
ciphey -f encrypted.txt
ciphey -- "Encrypted input"
ciphey -t "Encrypted input"
To get rid of the progress bars, probability table, and all the noise use the quiet mode.
ciphey -t "encrypted text here" -q
For a full list of arguments, run ciphey --help
.
You can import Ciphey's main and use it in your own programs and code. from Ciphey.__main__ import main
Ciphey was invented by Bee in 2008, and revived in 2019. Ciphey wouldn't be where it was today without Cyclic3 - president of UoL's Cyber Security Society.
Ciphey was revived & recreated by the Cyber Security Society for use in CTFs. If you're ever in Liverpool, consider giving a talk or sponsoring our events. Email us at cybersecurity@society.liverpoolguild.org
to find out more 🤠
Major Credit to George H for working out how we could use proper algorithms to speed up the search process. Special thanks to varghalladesign for designing the logo. Check out their other design work!
Don't be afraid to contribute! We have many, many things you can do to help out. Each of them labelled and easily explained with examples. If you're trying to contribute but stuck, tag @bee-san ✨
Alternatively, join the Discord group and send a message there (link in contrib file) or at the top of this README as a badge.
Please read the contributing file for exact details on how to contribute ✨
By doing so, you'll get your name added to the README below and get to be apart of an ever-growing project!
The contributions will be used to fund not only the future of Ciphey and its authors, but also Cyber Security Society at the University of Liverpool.
GitHub doesn't support "sponsor this project and we'll evenly distribute the money", so pick a link and we'll sort it out on our end 🥰
Thanks goes to these wonderful people (emoji key):
This project follows the all-contributors specification. Contributions of any kind welcome!
FAQs
Automated Decryption Tool
We found that ciphey demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.