SkillAgentSearch skills...

Catalyzer

A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files

Install / Use

/learn @Almorabea/Catalyzer
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

██████╗ █████╗ ████████╗ █████╗ ██╗  ██╗   ██╗███████╗███████╗██████╗ 
██╔════╝██╔══██╗╚══██╔══╝██╔══██╗██║  ╚██╗ ██╔╝╚══███╔╝██╔════╝██╔══██╗
██║     ███████║   ██║   ███████║██║   ╚████╔╝   ███╔╝ █████╗  ██████╔╝
██║     ██╔══██║   ██║   ██╔══██║██║    ╚██╔╝   ███╔╝  ██╔══╝  ██╔══██╗
╚██████╗██║  ██║   ██║   ██║  ██║███████╗██║   ███████╗███████╗██║  ██║
 ╚═════╝╚═╝  ╚═╝   ╚═╝   ╚═╝  ╚═╝╚══════╝╚═╝   ╚══════╝╚══════╝╚═╝  ╚═╝

Description

A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files that could contain some Powershells, WMI, Vbs, and many more scripting languages inside them. It will even try to detect if the file includes some sort of executable inside it. For now, you can use it for the new wave of malicious .one or OneNote files. I hope it helps.

Usage:

python3 Catalyzer.py -h 
usage: Catalyzer.py [-h] [-f FILE] [-c CUT] [-d DUMP] [-p PASSWORD] [-fu FOLDER] [-s FORMAT]

optional arguments:
  -h, --help            show this help message and exit
  -f FILE, --file FILE  The name of the file that you wish to work with
  -c CUT, --cut CUT     Display portion of the file like hex : 00000:00100 without 0x (not required)
  -d DUMP, --dump DUMP  Dump specified portion of the working file into a new file (not required)
  -p PASSWORD, --password PASSWORD
                        Protected ZIP file password
  -fu FOLDER, --folder FOLDER
                        Analyze the full folder
  -s FORMAT, --format FORMAT
                        The format of the dump data (hex, base64)

For file analysis use the tool like this:

python3 Catalyzer.py -f /file/path

For full folder analysis use the tool like this:

python3 Catalyzer.py -fu /folder/path

For displaying a portion of a file use:

python3 Catalyzer.py -f /file/path -c StartingOffset:Endingoffset  ex : 00000000:00000100

For dumping a portion of a file to either base64 or Hex use:

python3 Catalyzer.py -f /file/path -d StartingOffset:Endingoffset  ex : 00000000:00000100 -s hex or base64

Quick Walk Through

IMAGE ALT TEXT HERE

Caveat

This is an automated tool which means it relies on signatures and things in a particular order and could be fooled by malware authors. so use it in your initial assessment and carry it out from there.

Written By

Ahmad Almorabea @almorabea

View on GitHub
GitHub Stars26
CategoryDevelopment
Updated2mo ago
Forks4

Languages

Python

Security Score

75/100

Audited on Jan 10, 2026

No findings