CyberChef is โThe Cyber Swiss Army Knifeโ โ a web app for encryption, encoding, compression, and data analysis, originally developed by GCHQ. Operations are chained together in a visual recipe to transform data step-by-step, all client-side in your browser.
Key Features:
amd64 and arm64helm repo add obeone https://charts.obeone.cloud
helm install cyberchef obeone/cyberchef
This chart bootstraps a CyberChef deployment on a Kubernetes cluster using the Helm package manager.
It deploys the multi-arch obeoneorg/cyberchef image (rebuilt from the upstream sources) so you can run CyberChef on amd64 and arm64 nodes alike.
To install the chart with the release name cyberchef:
helm install cyberchef obeone/cyberchef
The command deploys CyberChef on the Kubernetes cluster with default configuration. The Parameters section lists the parameters that can be configured during installation.
To uninstall the cyberchef deployment:
helm uninstall cyberchef
Below is an example values.yaml exposing CyberChef behind an ingress:
image:
repository: obeoneorg/cyberchef
pullPolicy: IfNotPresent
env:
TZ: "Europe/Paris"
ingress:
main:
enabled: true
ingressClassName: nginx
annotations:
cert-manager.io/cluster-issuer: letsencrypt-prod
hosts:
- host: cyberchef.example.com
paths:
- path: /
pathType: Prefix
tls:
- hosts:
- cyberchef.example.com
secretName: cyberchef-tls
# CyberChef is stateless, persistence is rarely needed.
persistence: {}
The container exposes CyberChef on port 8000. The default service maps cluster port 8000 to the same container port. Adjust service.main.ports.http.port if you need a different cluster-side port.
| Key | Type | Default | Description |
|---|---|---|---|
| image.repository | string | obeoneorg/cyberchef |
Image repository |
| image.tag | string | chart.appVersion |
Image tag (defaults to chart appVersion) |
| image.pullPolicy | string | Always |
Image pull policy |
| Key | Type | Default | Description |
|---|---|---|---|
| env | object | See below | Environment variables |
| env.TZ | string | UTC |
Container timezone |
| Key | Type | Default | Description |
|---|---|---|---|
| service.main.ports.http.port | int | 8000 |
HTTP service port |
| Key | Type | Default | Description |
|---|---|---|---|
| ingress.main.enabled | bool | false |
Enable the ingress |
| ingress.main.ingressClassName | string | "" |
Ingress class |
| ingress.main.hosts | list | See docs | Ingress hosts (see k8s-at-home common chart) |
| ingress.main.tls | list | See docs | Ingress TLS configuration |
| Key | Type | Default | Description |
|---|---|---|---|
| persistence | object | {} |
Persistence configuration (rarely needed for CyberChef) |
The public CyberChef instance is harmless for everyday use, but pasting sensitive payloads (tokens, internal hashes, customer data) into a third-party site is rarely a good idea โ even when โeverything happens client-sideโ.
Hosting your own instance keeps every byte inside your network, behind your own auth, with your own logs.
A self-hosted CyberChef works without Internet access, which makes it a perfect fit for incident response, malware triage, and DFIR labs that operate offline by design.
Large payloads (multi-MB pcap parsing, file extraction recipes) feel snappier when the JavaScript bundle is served from inside the cluster instead of the public CDN.
kubectl logs -l app.kubernetes.io/name=cyberchef
kubectl port-forward svc/cyberchef 8000:8000
# then open http://127.0.0.1:8000 in a browser
| Repository | Name | Version |
|---|---|---|
| https://library-charts.k8s-at-home.com | common | 4.5.2 |
| Name | Url | |
|---|---|---|
| obeone | obeone@obeone.org | ย |
Autogenerated from chart metadata using helm-docs v1.14.2