Skip to content

Releases: SUmidcyber/ZeroScout

🦅 ZeroScout v1.0.0 - The Autonomous Threat Hunter

30 Nov 11:33
7ddef13

Choose a tag to compare

🚀 Initial Release of ZeroScout

We are proud to announce the first public release of ZeroScout, the next-generation hybrid threat hunting framework designed for DFIR and Malware Analysts.

ZeroScout acts as your Cyber Defense HQ, visualizing attacks in real-time and identifying APT groups using genetic code analysis.

🔥 Key Features in v1.0.0:

  • 🌍 Live War Room: Visualize C2 traffic on a dynamic ASCII world map directly in your terminal.
  • 🧬 Genetic Attribution: Identify threat actors (Lazarus, APT28, etc.) using ImpHash and SSDeep analysis.
  • 🛡️ Auto-Defense Architect: Automatically generate YARA and SIGMA rules based on behavioral analysis.
  • 🧠 Hybrid Engine:
    • Local Mode: Uses advanced heuristics, entropy analysis, and Windows Defender bridging (No internet required).
    • Cloud Mode: Integrates with the ZeroScout Cloud Engine for sandbox detonation.
  • 🔍 Mass Hunt: Scan entire directories to find hidden threats in seconds.

📦 Installation

git clone https://github.com/SUmidcyber/ZeroScout.git
cd ZeroScout
pip install .
python -m zeroscout.cli scan "malware.exe"