I hereby claim:
- I am te-k on github.
- I am tekkk (https://keybase.io/tekkk) on keybase.
- I have a public key ASAxurfjiAkDdpJOUYDFrvng5LRqFnBezupbp638b9Szawo
To claim this, I am signing this object:
| #! /usr/bin/python2 | |
| import sys | |
| import requests | |
| import tempfile | |
| from PIL import Image | |
| def resize(source_path, dest_path): | |
| """Resize the image from the source path to the dest""" | |
| png = Image.open(source_path) | |
| width = png.size[0] |
I hereby claim:
To claim this, I am signing this object:
| 1996-07-17 14:17:04 - ./Resources/LegacyWindowsExploits/Resources/Tools/COMPRESS.EXE | |
| 1998-01-03 14:17:13 - ./Resources/LegacyWindowsExploits/Resources/Tools/nc.exe | |
| 1998-07-12 21:59:28 - ./Resources/LegacyWindowsExploits/Resources/Tools/REG.EXE | |
| 1998-11-09 15:11:07 - ./Resources/LegacyWindowsExploits/Resources/Tools/DUMPEL.EXE | |
| 1999-09-25 06:59:23 - ./Resources/LegacyWindowsExploits/Resources/Tools/sc.exe | |
| 1999-10-29 13:56:03 - ./Resources/LegacyWindowsExploits/Resources/Tools/ClrSecLog.exe | |
| 2000-05-16 11:27:32 - ./Resources/LegacyWindowsExploits/Resources/Tools/MakeDebugScript2.exe | |
| 2000-09-19 17:44:14 - ./Resources/LegacyWindowsExploits/Resources/Tools/simrpc.exe | |
| 2000-10-03 17:01:55 - ./Resources/Ep/clocksvc.exe | |
| 2001-09-25 11:52:45 - ./Resources/LegacyWindowsExploits/Resources/Tools/xxxRIDEAREA.exe |
| nbf.sys|NetBEUI Frames Protocol Driver|ISO_HASH|233dfc9e9a807e557e18cb19a6a657875ab4072c|98176|20130424 | |
| 1394bus.sys|1394 Bus Device Driver|ISO_HASH|ed2ee2dbf59cbc45b66026c4513c7e46c44f9367|49536|20130424 | |
| 1394vdbg.sys|1394 Virtual Host Debugger Driver|ISO_HASH|107a8aad1760241b990a20050caa21cdcb2da1e8|11264|20130424 | |
| abp480n5.sys|AdvanSys SCSI Controller Driver|ISO_HASH|66d302025842f2268a867fc9a86b5bbcf0de5bab|23552|20130424 | |
| acpi.sys|ACPI Driver for NT|ISO_HASH|8a1c625c938d6f1a1c6a36a6268f7ca208427a05|179200|20130424 | |
| acpiec.sys|ACPI Embedded Controller Driver|ISO_HASH|f27a1ee007eb29db95bebeeb16f76322e2cdfdce|11648|20130424 | |
| adpu160m.sys|Adaptec Ultra160 SCSI miniport|ISO_HASH|53164fdfab5a0c0dd564d362c9da005f41e0bcc0|101888|20130424 | |
| advapi32.dll|Advanced Windows 32 Base API|ISO_HASH|19ab07a2bee6bbeaf71fa8a4376809bd4ee879db|549888|20130424 | |
| afd.sys|Ancillary Function Driver for WinSock|ISO_HASH|9263047bf35de34842e2438cbf80c30ace8c2936|130688|20130424 | |
| aha154x.sys|Adaptec AHA-154x series SCSI miniport|ISO_HASH|038e5cb |
| 000stthk.exe|Toshiba Hotkey Configuration|NONE | |
| 007ssinstall.exe|007 Spy Software|NONE | |
| 00thotkey.exe|Toshiba Keyboard Helper|NONE | |
| 123downloadsuk[1].exe|123Mania Hijacker|NONE | |
| 12popup.exe|12Ghosts Popup-Killer|NONE | |
| 153.exe|??? Dialer.W32.153 ???|MALICIOUS_SOFTWARE | |
| 180sainstalleradperform.exe|180Solutions Zango|NONE | |
| 180sainstallernusac.exe|180SearchAssistant|NONE | |
| 1xconfig.exe|SCM MicroSystems Helper|NONE | |
| 2portalmon.exe|2wSysTray|NONE |
| clocksvc.exe|*** PATROLWAGON ***|SAFE | |
| help16.exe|*** SOMETHING YOU UPLOADED??? ***|SAFE | |
| iexplorer.exe|*** UNITEDRAKE INSTALLER *** or RapidBlaster Virus|SAFE | |
| msalgmon.exe|*** VALIDATOR ***|SAFE | |
| mscache32.exe|*** FRIENDLY TOOL - Seek Help ***|SAFE | |
| mscfg32.exe|*** UNITEDRAKE ***|SAFE | |
| msdnsche.exe|*** FRIENDLY TOOL - Seek Help ***|SAFE | |
| msmmc32.exe|*** FRIENDLY TOOL - Seek Help ***|SAFE | |
| msntfs.exe|*** FRIENDLY TOOL - Seek Help ***|SAFE | |
| msregstr.exe|*** VALIDATOR ***|SAFE |
| d46af65cb7bd12ce77b4d88bbdd4a005 5000_1.1.4.sisx https://www.virustotal.com/en/file/ce6bdf3374777757a36b8c3ad5e6cc8b6aced6f5083efdd286e6cb8f6837057f/analysis/ | |
| 39be87178c84d4afd07a80323a1d4b91 5002_2.24.3_green.APK https://www.virustotal.com/en/file/263219f185aa2a847bcb4ca981ec4a7c7eff8ded2d3b49d6fb2b4a578b43af60/analysis/ | |
| a5b589f4edac1aea9952d3faff261817 5002_-2.25.1_green.APK https://www.virustotal.com/en/file/2a1e5a7dafa54a23fe9050f1fdd1286d3bdfb75a80a90cafebfdbbc451f4f9a4/analysis/ | |
| 306adab7cfcb0d9a13956ca9e9dbd59a 5003_1.4.2.jad https://www.virustotal.com/en/file/cbd70044cdb54fcad29592a0c89d6b8aa9bf6af7fa825faa8447df134124dd5c/analysis/ | |
| eb295fe2e40f12014cdb05de07edcae2 5006_-1.0.12.exe https://www.virustotal.com/en/file/c134e6f40de54e2c5635ea2e25d7ea5b8c36528849c6ef7dd4d3b860af5fb521/analysis/ | |
| 8f6a42defdc8632c1baf961d7d9c3e5b 5006_1.0.13.exe https://www.virustotal.com/en/file/530c80602f72df99a4ed6c609db16f76d6260c984852c4a3f9a2dd03180b180b/analysis/ | |
| fa26d3c6fe253a35 |
| rule APT32_ActiveMime_Lure { | |
| meta: | |
| filetype="MIME entity" | |
| author="Ian Ahl (@TekDefense) and Nick Carr (@ItsReallyNick)" | |
| date="2017-03-02" | |
| description="Developed to detect APT32 (OceanLotus group) phishing lures used to target FireEye customers in 2016 and 2017" | |
| strings: | |
| $a1= "office_text" wide ascii | |
| $a2= "schtasks /create /tn" wide ascii |
| from sslyze.server_connectivity import ServerConnectivityInfo, ServerConnectivityError | |
| from sslyze.ssl_settings import HttpConnectTunnelingSettings, TlsWrappedProtocolEnum | |
| from sslyze.plugins.certificate_info_plugin import CertificateInfoScanCommand | |
| from sslyze.synchronous_scanner import SynchronousScanner | |
| from cryptography.hazmat.backends.openssl import x509 | |
| from cryptography.hazmat.primitives.serialization import Encoding | |
| from cryptography.x509 import DNSName, ExtensionNotFound, ExtensionOID, NameOID | |
| from enum import Enum | |
| import os | |
| import json |
| import argparse | |
| import OpenSSL | |
| from dateutil.parser import parse | |
| if __name__ == '__main__': | |
| parser = argparse.ArgumentParser(description='Process some certs') | |
| parser.add_argument('CERT', help="Cert file to parse") | |
| args = parser.parse_args() | |
| with open(args.CERT, 'r') as f: |