HADES
Hidden Artifact Detection & EXIF Scanner - Enterprise Metadata Forensics Engine
PRODUCTION-READY | v1.1.0 GA
Court-ready metadata forensics for security teams, incident responders, and SOC operations. Zero-execution analysis, never runs target files.
Sample composition: MalwareBazaar 3,271 (98.7% detection) · Contagio 11,877 (99.9%) · Targeted Gootloader 9 (100%) · Clean corpus 311 (0% actionable FP, zero HIGH or CRITICAL FPs). Zero crashes, zero timeouts. Overall malware detection: 99.6%.
HADES is an enterprise metadata forensics engine built for security teams and incident responders. Validated against 15,468 real-world samples across four corpora with 98.7% detection on MalwareBazaar (3,271), 99.9% on Contagio (11,877), 100% on targeted Gootloader samples, and a 0% actionable false-positive rate on 311 clean files (zero HIGH or CRITICAL false positives). Zero crashes, zero timeouts. Multi-layer detection combines 76 YARA rules, ML ensemble models, behavioral analysis, 26 forensic analyzers, and deep format parsing across 45+ file types, without executing target files. Enterprise-grade two-axis scoring (confidence × severity) matches CrowdStrike/Palo Alto patterns, with court-ready evidence handling and automated response playbooks.
Get Started in 5 Minutes
Python 3.8+ and ExifTool required. Optional dependencies unlock enterprise features.
- Python 3.8+, CPython on Linux, macOS, or Windows
- ExifTool, Phil Harvey's ExifTool on PATH for metadata extraction
- Optional: PostgreSQL, Redis, YARA, scikit-learn, Docker, installed via dependency groups
Capabilities
Metadata Forensics & Deep Format Analysis
Core scanning engine, extracts metadata from 200+ formats via 26 dedicated forensic analyzers. Deep-parses PDF (shadow attacks, filter chains), Office (macros, DDE, VBA stomping, hidden content), RTF (Equation Editor, template injection), archive structures (Zombie ZIP, RAR5/7z), and analyzes audio, video, email, and web file metadata for embedded threats.
Detection Layers:
- 26 forensic analyzers: images, documents, archives, audio, video, email, web
- Archive forensics: Zombie ZIP, concatenation, bombs, RAR5/7z headers
- Document forensics: RTF, LNK, legacy Office, OneNote, VBA stomping
- Audio/video: MP3 ID3, WAV, OGG, FLAC, MKV, MP4, AVI metadata
- Email/web: phishing detection, CSV formula injection, HTML threats, EPS
- Steganography: JPEG DCT analysis, palette stego, EOF data, tool signatures
- 76 YARA rules + firmware analysis (UEFI, SPI flash, BadUSB, wipers)
ML Ensemble & Behavioral Analysis
Multi-model machine learning ensemble (Isolation Forest + Random Forest + optional XGBoost) with 25 statistical features including Shannon entropy and byte frequency analysis. Behavioral engine detects coordinated attack campaigns through IOC correlation and metadata pattern similarity.
Analysis Capabilities:
- Weighted multi-model voting with labeled data management
- Campaign detection via shared IOC correlation (union-find)
- Metadata similarity scoring (Jaccard) and temporal clustering
- GPS forensics with impossible travel detection
- Auto-retraining on labeled datasets with CSV import/export
MITRE ATT&CK Mapping
Automatic mapping of detection findings to 51+ MITRE ATT&CK techniques across 11 tactics. Every finding is classified with technique IDs, tactic categories, and severity scores, ready for compliance reporting and threat intelligence correlation.
Coverage:
- 51+ techniques: script injection, backdoors, steganography, polyglot, macros, encoding
- 11 tactics: Initial Access through Impact
- 52+ finding-to-technique mappings
- API endpoint for technique lookup and tactic queries
Evidence Chain & Case Management
Forensic-grade evidence handling, SHA-256 hash-chained immutable audit log, case management with analyst notes, and self-verifying evidence export packages with HMAC-SHA256 signatures. Built for court-admissible forensics.
Forensic Features:
- Append-only hash-chained audit log with tamper detection
- Case CRUD with scan linking and analyst notes
- Evidence export as self-verifying ZIP (includes verify script)
- Chain of custody timeline
Automated Response Playbooks
Event-driven response automation with 10+ built-in playbooks covering phishing triage, malware analysis, BEC detection, ransomware response, and insider threat workflows. Actions include case creation, SIEM forwarding, Slack/Teams notification, evidence export, and file quarantine.
Playbook Engine:
- Trigger conditions: threat score, YARA match, finding type, file extension, sender domain
- Priority ordering with retry and exponential backoff
- Per-action status tracking and execution history
- Quarantine manager with audit trail
- WebSocket broadcast for real-time dashboard updates
REST API, Dashboard & SDK
FastAPI server with authenticated endpoints, WebSocket live updates, and a 16-view browser-based dashboard. Python SDK with retry logic, webhook subscriptions, and SSE streaming for programmatic integration.
Interface Options:
- FastAPI with async endpoints, Pydantic models, Swagger UI at /docs
- 16-view dashboard: Scan, Monitor, Cases, Audit, MITRE, Rules, Playbooks, Alerts, Analytics, SIEM Connectors, Quarantine, and more
- Python SDK:
pip install hades-sdk(via Cloudsmith) - X-API-Key auth, rate limiting, CORS, WebSocket
Enterprise Security & Observability
Role-based access control with admin/analyst/viewer roles, SSO via OIDC and SAML, AES-256-GCM field-level encryption at rest, multi-tenant isolation, and full observability with Prometheus metrics and four pre-built Grafana dashboards.
Enterprise Features:
- RBAC with permission matrix and API key rotation
- SSO: OIDC JWT validation, SAML AuthnRequest, JIT user provisioning
- AES-256-GCM encrypted storage with key management
- Multi-tenant isolation with API key to tenant mapping
- Prometheus metrics (20+), Grafana dashboards (4), Alertmanager
SIEM & Platform Integrations
Native SIEM connectors for Splunk HEC, Elasticsearch, and Microsoft Sentinel with batching, retry, and health checks. Format-based output in Syslog, CEF, STIX, LEEF, and ECS. Plus cloud storage scanning (S3, GCS, Azure), network sensors (Zeek, Suricata), email gateway, CI/CD pipelines, and Slack/Teams bots.
Integration Points:
- Native SIEM: Splunk HEC, Elasticsearch bulk API, Sentinel Log Analytics
- Cloud: AWS S3, Google Cloud Storage, Azure Blob Storage
- Network: Zeek connector, Suricata connector, SMTP email gateway
- DevOps: CI/CD scanning with SARIF output, GitHub/GitLab integration
- Chat: Slack bot with Block Kit, Teams bot with Adaptive Cards
Deployment & Scaling
Deploy anywhere, standalone CLI, Docker containers, or Kubernetes with Helm charts and horizontal pod autoscaling. Async scan pipeline with persistent ExifTool process pool, distributed worker pool with Redis task queues, and two-tier scan caching.
Deployment Options:
- Cloudsmith:
pip install hades-scannerwith 4 dependency groups (private registry) - Docker: multi-stage production image, Docker Compose stacks
- Kubernetes: Helm chart with HPA, ServiceMonitor, Kustomize overlays
- Distributed workers with Redis task queues and heartbeat monitoring
- Two-tier cache (in-memory LRU + Redis), pipeline profiler
Pricing
HADES is a proprietary platform with a free Community tier. Paid tiers are unlocked via license key activation.
Community
- 10 scans/month
- Heuristic & IOC detection
- Threat score & severity summary
- Evidence chain
- 10 MB file size limit
Professional
$799/yr (save 33%)
- 5,000 scans/month
- 76 YARA rules & ML ensemble detection
- All 26 forensic analyzers
- Full findings, MITRE ATT&CK mapping
- Batch scanning & SIEM export
- Threat intelligence feeds
- 100 MB file size limit
- Priority email support
Team
$2,499/yr (save 30%)
- 50,000 scans/month
- Everything in Professional, plus:
- RBAC (admin/analyst/viewer roles)
- SSO (OIDC + SAML)
- Cloud scanning (S3, GCS, Azure)
- CI/CD pipeline integration
- Slack & Teams bots
- AES-256-GCM encrypted storage
- 500 MB file size limit
Enterprise
Annual contract
- Unlimited scans
- Everything in Team, plus:
- Multi-tenant isolation
- SOAR integration
- Kafka/NATS streaming
- Unlimited file size
- Dedicated support & custom SLA
All paid plans include a 14-day free trial. Annual plans save up to 33%. Contact sales@darkhorseinfosec.com for volume discounts.
Frequently Asked Questions
Ready to detect hidden threats in your file metadata?