Skip to content

Instantly share code, notes, and snippets.

@lkraider
Created June 14, 2020 21:25
Show Gist options
  • Save lkraider/9530798a695586fc1580d0728966f6f0 to your computer and use it in GitHub Desktop.
Save lkraider/9530798a695586fc1580d0728966f6f0 to your computer and use it in GitHub Desktop.
X-OVH-SPAMCAUSE decoder
def decode(msg):
text = []
for i in range(0, len(msg), 2):
text.append(unrot(msg[i: i + 2]))
return str.join('', text)
def unrot(pair, key=ord('x')):
offset = 0
for c in 'cdefgh':
if c in pair:
offset = (ord('g') - ord(c)) * 16
break
return chr(sum(ord(c) for c in pair) - key - offset)
if __name__ == '__main__':
import sys
print(decode(sys.argv[1]))
@lkraider
Copy link
Author

I have created a repo for a tool that helps look into the data (inspect-only, decoding of the new binary format is not available):
https://github.com/lkraider/vadespamdecode

i would like to thank you for your effort bro. But it is still not decoding the new vad format bro!!

Yes, as mentioned in the message. If you have any insight on how to decode it any help is welcome.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment