HADES
Hidden Artifact Detection & EXIF Scanner - Enterprise Metadata Forensics Engine
PRODUCTION-READY | v1.4.2 GA
Court-ready metadata forensics for security teams, incident responders, and SOC operations. Zero-execution analysis, never runs target files.
Sample composition: MalwareBazaar 3,271 (98.7% detection) · Contagio 11,877 (99.9%) · Targeted Gootloader 9 (100%) · Clean corpus 311 (0% actionable FP, zero HIGH or CRITICAL FPs). Zero crashes, zero timeouts. Overall malware detection: 99.6%.
HADES is an enterprise metadata forensics engine built for security teams and incident responders. Validated against 15,468 real-world samples across four corpora with 98.7% detection on MalwareBazaar (3,271), 99.9% on Contagio (11,877), 100% on targeted Gootloader samples, and a 0% actionable false-positive rate on 311 clean files (zero HIGH or CRITICAL false positives). Zero crashes, zero timeouts. Multi-layer detection combines 76 YARA rules, ML ensemble models, behavioral analysis, 26 forensic analyzers, and deep format parsing across 45+ file types, without executing target files. Enterprise-grade two-axis scoring (confidence × severity) matches CrowdStrike/Palo Alto patterns, with court-ready evidence handling and automated response playbooks.
Get Started in 5 Minutes
HADES v1.4.2 is shipping today via two install paths. Buy a license at the customer portal or try the live demo in your browser first.
- No Python or ExifTool needed, the binary is Nuitka-compiled with all dependencies bundled inline
- Linux x86_64 available today via Path A or Path B (Linuxbrew); macOS Path B today, Path A x86_64/arm64 by 2026-Q3; Windows binary build pending code-signing cert
- License required, Pro+ tier unlocks YARA, ML, deep format analysis; community tier (no license) runs heuristics + IOC only
Capabilities
Metadata Forensics & Deep Format Analysis
Core scanning engine, extracts metadata from 200+ formats via 26 dedicated forensic analyzers. Deep-parses PDF (shadow attacks, filter chains), Office (macros, DDE, VBA stomping, hidden content), RTF (Equation Editor, template injection), archive structures (Zombie ZIP, RAR5/7z), and analyzes audio, video, email, and web file metadata for embedded threats.
Detection Layers:
- 26 forensic analyzers: images, documents, archives, audio, video, email, web
- Archive forensics: Zombie ZIP, concatenation, bombs, RAR5/7z headers
- Document forensics: RTF, LNK, legacy Office, OneNote, VBA stomping
- Audio/video: MP3 ID3, WAV, OGG, FLAC, MKV, MP4, AVI metadata
- Email/web: phishing detection, CSV formula injection, HTML threats, EPS
- Steganography: JPEG DCT analysis, palette stego, EOF data, tool signatures
- 76 YARA rules + firmware analysis (UEFI, SPI flash, BadUSB, wipers)
ML Ensemble & Behavioral Analysis
Multi-model machine learning ensemble (Isolation Forest + Random Forest + optional XGBoost) with 25 statistical features including Shannon entropy and byte frequency analysis. Behavioral engine detects coordinated attack campaigns through IOC correlation and metadata pattern similarity.
Analysis Capabilities:
- Weighted multi-model voting with labeled data management
- Campaign detection via shared IOC correlation (union-find)
- Metadata similarity scoring (Jaccard) and temporal clustering
- GPS forensics with impossible travel detection
- Auto-retraining on labeled datasets with CSV import/export
MITRE ATT&CK Mapping
Automatic mapping of detection findings to 51+ MITRE ATT&CK techniques across 11 tactics. Every finding is classified with technique IDs, tactic categories, and severity scores, ready for compliance reporting and threat intelligence correlation.
Coverage:
- 51+ techniques: script injection, backdoors, steganography, polyglot, macros, encoding
- 11 tactics: Initial Access through Impact
- 52+ finding-to-technique mappings
- API endpoint for technique lookup and tactic queries
Evidence Chain & Case Management
Forensic-grade evidence handling, SHA-256 hash-chained immutable audit log, case management with analyst notes, and self-verifying evidence export packages with HMAC-SHA256 signatures. Built for court-admissible forensics.
Forensic Features:
- Append-only hash-chained audit log with tamper detection
- Case CRUD with scan linking and analyst notes
- Evidence export as self-verifying ZIP (includes verify script)
- Chain of custody timeline
Automated Response Playbooks
Event-driven response automation with 10+ built-in playbooks covering phishing triage, malware analysis, BEC detection, ransomware response, and insider threat workflows. Actions include case creation, SIEM forwarding, Slack/Teams notification, evidence export, and file quarantine.
Playbook Engine:
- Trigger conditions: threat score, YARA match, finding type, file extension, sender domain
- Priority ordering with retry and exponential backoff
- Per-action status tracking and execution history
- Quarantine manager with audit trail
- WebSocket broadcast for real-time dashboard updates
REST API, Dashboard & SDK
FastAPI server with authenticated endpoints, WebSocket live updates, and a 16-view browser-based dashboard. Python SDK with retry logic, webhook subscriptions, and SSE streaming for programmatic integration.
Interface Options:
- FastAPI with async endpoints, Pydantic models, Swagger UI at /docs
- 16-view dashboard: Scan, Monitor, Cases, Audit, MITRE, Rules, Playbooks, Alerts, Analytics, SIEM Connectors, Quarantine, and more
- X-API-Key auth, rate limiting, CORS, WebSocket
Enterprise Security & Observability
Role-based access control with admin/analyst/viewer roles, SSO via OIDC and SAML, AES-256-GCM field-level encryption at rest, multi-tenant isolation, and full observability with Prometheus metrics and four pre-built Grafana dashboards.
Enterprise Features:
- RBAC with permission matrix and API key rotation
- SSO: OIDC JWT validation, SAML AuthnRequest, JIT user provisioning
- AES-256-GCM encrypted storage with key management
- Multi-tenant isolation with API key to tenant mapping
- Prometheus metrics (20+), Grafana dashboards (4), Alertmanager
SIEM & Platform Integrations
Native SIEM connectors for Splunk HEC, Elasticsearch, and Microsoft Sentinel with batching, retry, and health checks. Format-based output in Syslog, CEF, STIX, LEEF, and ECS. Plus cloud storage scanning (S3, GCS, Azure), network sensors (Zeek, Suricata), email gateway, CI/CD pipelines, and Slack/Teams bots.
Integration Points:
- Native SIEM: Splunk HEC, Elasticsearch bulk API, Sentinel Log Analytics
- Cloud: AWS S3, Google Cloud Storage, Azure Blob Storage
- Network: Zeek connector, Suricata connector, SMTP email gateway
- DevOps: CI/CD scanning with SARIF output, GitHub/GitLab integration
- Chat: Slack bot with Block Kit, Teams bot with Adaptive Cards
Deployment & Scaling
Deploy as a single self-contained binary, no Python, ExifTool, or other runtime needed on the host. The binary ships with its full dependency tree bundled inline via Nuitka. Async scan pipeline with persistent in-process worker pool, two-tier scan caching, and pipeline profiler all run inside the binary. Containerized + distributed deployments (Docker Compose, Kubernetes Helm chart with HPA, Redis-backed worker queues) are on the Enterprise roadmap.
Deployment Options:
- Single-process binary (Linux x86_64 today; macOS Intel + Apple Silicon and Windows binaries on the 2026-Q3 roadmap)
- Direct download via signed URL from the customer portal, or Homebrew tap (DarkHorse-InfoSec/tap)
- FastAPI REST API server (
hades-server) for SOC integrations and CI/CD pipelines - Containerized + distributed deployments (Docker Compose, Kubernetes Helm chart, Redis-backed worker queues) on the Enterprise roadmap
Pricing
HADES is a proprietary platform with a free Community tier. Paid tiers are unlocked via license key activation.
Community
- 10 scans/month
- Heuristic & IOC detection
- Threat score & severity summary
- Evidence chain
- 10 MB file size limit
Professional
$799/yr (save 33%)
- 5,000 scans/month
- 76 YARA rules & ML ensemble detection
- All 26 forensic analyzers
- Full findings, MITRE ATT&CK mapping
- Batch scanning & SIEM export
- Threat intelligence feeds
- 100 MB file size limit
- Priority email support
Team
$2,499/yr (save 30%)
- 50,000 scans/month
- Everything in Professional, plus:
- RBAC (admin/analyst/viewer roles)
- SSO (OIDC + SAML)
- Cloud scanning (S3, GCS, Azure)
- CI/CD pipeline integration
- Slack & Teams bots
- AES-256-GCM encrypted storage
- 500 MB file size limit
Enterprise
Annual contract
- Unlimited scans
- Everything in Team, plus:
- Multi-tenant isolation
- SOAR integration
- Kafka/NATS streaming
- Unlimited file size
- Dedicated support & custom SLA
All paid plans include a 14-day free trial. Annual plans save up to 33%. Contact sales@darkhorseinfosec.com for volume discounts.
Frequently Asked Questions
Ready to detect hidden threats in your file metadata?