pyc2bytecode
opensquat
Our great sponsors
pyc2bytecode | opensquat | |
---|---|---|
1 | 5 | |
127 | 648 | |
- | - | |
0.0 | 6.1 | |
11 months ago | 3 months ago | |
Python | Python | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pyc2bytecode
-
PSA: Global QR Code bot could have malware...
I was able to figure out that this is a python program which was compiled to an .exe. Using uncompyle6 and pyc2bytecode, I was able to decompile the .exe into the python bytecode...but I'm no expert at reading python bytecode. If you want to do this yourself, note that you will need to use the same version of python as the version used to make the exe (python 3.9). I did easily by changing the python_version in my Pipfile to 3.9 and using pipenv shell.
opensquat
-
Have I Been Squatted?
A different solution that runs locally is opensquat.
- OpenSquat
- How to find a similar looking domains
- Have I Been Sqautted – free DNS typosquatting platform
- The openSquat is an opensource tool for detecting phishing domains and domain squatting. Supports multiple features such as permutations such as homograph attack, typosquatting and bit squatting.
What are some alternatives?
OneNoteAnalyzer - A C# based tool for analysing malicious OneNote documents
dnstwist - Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
karton - Distributed malware processing framework based on Python, Redis and S3.
ail-typo-squatting - Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.
toolkit - The essential toolkit for reversing, malware analysis, and cracking
IntelOwl - IntelOwl: manage your Threat Intelligence at scale
python-uncompyle6 - A cross-version Python bytecode decompiler
Scrummage - The Ultimate OSINT and Threat Hunting Framework
AMAYARA-Lab - The アマヤラ Lab project provides a ready-to-use Jupyter Lab environment to help out with Android malware analysis using YARA rules.
TweetFeed - TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
spiderfoot - SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
MurMurHash - This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.