Releases: SUmidcyber/ZeroScout
Releases · SUmidcyber/ZeroScout
🦅 ZeroScout v1.0.0 - The Autonomous Threat Hunter
🚀 Initial Release of ZeroScout
We are proud to announce the first public release of ZeroScout, the next-generation hybrid threat hunting framework designed for DFIR and Malware Analysts.
ZeroScout acts as your Cyber Defense HQ, visualizing attacks in real-time and identifying APT groups using genetic code analysis.
🔥 Key Features in v1.0.0:
- 🌍 Live War Room: Visualize C2 traffic on a dynamic ASCII world map directly in your terminal.
- 🧬 Genetic Attribution: Identify threat actors (Lazarus, APT28, etc.) using ImpHash and SSDeep analysis.
- 🛡️ Auto-Defense Architect: Automatically generate YARA and SIGMA rules based on behavioral analysis.
- 🧠 Hybrid Engine:
- Local Mode: Uses advanced heuristics, entropy analysis, and Windows Defender bridging (No internet required).
- Cloud Mode: Integrates with the ZeroScout Cloud Engine for sandbox detonation.
- 🔍 Mass Hunt: Scan entire directories to find hidden threats in seconds.
📦 Installation
git clone https://github.com/SUmidcyber/ZeroScout.git
cd ZeroScout
pip install .
python -m zeroscout.cli scan "malware.exe"