Skip to content

Instantly share code, notes, and snippets.

y0ug@h4ze ~ % irma.py list
Available analysis : ComodoCAVL, StaticAnalyzer, ClamAV, VirusTotal, McAfeeVSCL, GData, Kaspersky
y0ug@h4ze ~ % irma.py scan --filename ~/Downloads/eicar.com
scanid 3287c1e0-7fbb-40be-91c7-492a0d752f27 launched
y0ug@h4ze ~ % irma.py results 3287c1e0-7fbb-40be-91c7-492a0d752f27
Scan status : finished
eicar.com
[SHA256: 275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f]
VirusTotal No result
Comodo Antivirus for Linux ApplicUnwnt
#!/usr/bin/env python2
# -*- coding: utf-8 -*-
# 2014-11-15 17:33 CET
# y0ug
import sys
import argparse
if __name__ == "__main__":
data = open(sys.argv[1]).read()
data = data.split('\n')
@y0ug
y0ug / -
Created November 15, 2014 16:55
y0ug@h4ze /tmp % python irma_output_testcase_parser.py out_gdata.txt
expected_results = {
'eicar.cab': 'Virus: EICAR-Test-File (not a virus)',
'eicar.com.txt': 'Virus: EICAR-Test-File (not a virus) (Engine A)',
'eicar_niveau2.zip': 'Virus: EICAR-Test-File (not a virus)',
'eicar_lha.bin': 'Virus: EICAR-Test-File (not a virus)',
'eicar_gz.bin': 'Virus: EICAR-Test-File (not a virus)',
'eicarhqx_binhex.bin': 'Virus: Trojan.Script.135850 (Engine A)',
'eicar_mime.bin': 'Virus: EICAR-Test-File (not a virus)',
'eicar_cab.bin': 'Virus: EICAR-Test-File (not a virus)',
@y0ug
y0ug / -
Created March 8, 2015 01:23
" Color
"colo evening
" Enable syntax
syntax on
" Enable smarttab
filetype plugin indent on
" Tab settings
@y0ug
y0ug / pingmon.py
Last active December 22, 2015 00:28
import rrdtool
import os
import sys
import subprocess
import re
import time
import datetime
class GraphPing(object):
def __init__(self, target, reset=False):

Android Emulator

Packages

brew cask install adoptopenjdk8
brew cask install android-sdk
brew cask install intel-haxm

Setup

@y0ug
y0ug / emulate_win.py
Created July 9, 2020 11:59
PE x64 emulation with Triton
#!/usr/bin/env python
## -*- coding: utf-8 -*-
from __future__ import print_function
from triton import TritonContext, ARCH, CPUSIZE, MemoryAccess, OPCODE, Instruction
import os
import sys
import string
Triton = TritonContext()
@y0ug
y0ug / _IAT_qiling.py
Last active December 29, 2021 03:10
Using Qiling to resolve obfuscated import on windows
# Emulate sample to resolv obfuscated import with qiling
# Just one way to do it, this method is kind of slow.
# You need to have all the required DLL in the 'rootfs'
# Classic getprocaddress by hash we hook after the call
# read EAX and resolv the name from ql.loader.import_symbols
# compute the address of the mov operand
# generate the idapython code
# python3 IAT_qiling.py sample.exe | tee addr_ida.py
# idapython is in addr_ida.py at the end
@y0ug
y0ug / parse_reg_file.py
Created December 23, 2021 09:58
function to write/read from windows reg export
import sys
import zlib
import io
import re
from configparser import ConfigParser
import binascii
import argparse
import struct
import socket
from datetime import datetime
import sys
import os
import shutil
import datetime
import json
import base64
import argparse
import logging
import requests
import random