Created
June 14, 2020 21:25
-
-
Save lkraider/9530798a695586fc1580d0728966f6f0 to your computer and use it in GitHub Desktop.
X-OVH-SPAMCAUSE decoder
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
def decode(msg): | |
text = [] | |
for i in range(0, len(msg), 2): | |
text.append(unrot(msg[i: i + 2])) | |
return str.join('', text) | |
def unrot(pair, key=ord('x')): | |
offset = 0 | |
for c in 'cdefgh': | |
if c in pair: | |
offset = (ord('g') - ord(c)) * 16 | |
break | |
return chr(sum(ord(c) for c in pair) - key - offset) | |
if __name__ == '__main__': | |
import sys | |
print(decode(sys.argv[1])) |
I have created a repo for a tool that helps look into the data (inspect-only, decoding of the new binary format is not available):
https://github.com/lkraider/vadespamdecodei would like to thank you for your effort bro. But it is still not decoding the new vad format bro!!
Yes, as mentioned in the message. If you have any insight on how to decode it any help is welcome.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
i would like to thank you for your effort bro. But it is still not decoding the new vad format bro!!