-
-
Save lkraider/9530798a695586fc1580d0728966f6f0 to your computer and use it in GitHub Desktop.
| def decode(msg): | |
| text = [] | |
| for i in range(0, len(msg), 2): | |
| text.append(unrot(msg[i: i + 2])) | |
| return str.join('', text) | |
| def unrot(pair, key=ord('x')): | |
| offset = 0 | |
| for c in 'cdefgh': | |
| if c in pair: | |
| offset = (ord('g') - ord(c)) * 16 | |
| break | |
| return chr(sum(ord(c) for c in pair) - key - offset) | |
| if __name__ == '__main__': | |
| import sys | |
| print(decode(sys.argv[1])) |
I've been seeing this new format too. Orange.fr has changed to it. Any idea or suggestion?
I have created a repo for a tool that helps look into the data (inspect-only, decoding of the new binary format is not available):
I have created a repo for a tool that helps look into the data (inspect-only, decoding of the new binary format is not available):
i would like to thank you for your effort bro. But it is still not decoding the new vad format bro!!
I have created a repo for a tool that helps look into the data (inspect-only, decoding of the new binary format is not available):
https://github.com/lkraider/vadespamdecodei would like to thank you for your effort bro. But it is still not decoding the new vad format bro!!
Yes, as mentioned in the message. If you have any insight on how to decode it any help is welcome.
Looks like a base64 binary content, running base64 decode returns and ASCII prefix: vade1{…} confirming the version marker.
Sample code:
STDOUT/STDERR