win32-shellcode
pyWhat
win32-shellcode | pyWhat | |
---|---|---|
1 | 16 | |
4 | 6,376 | |
- | - | |
10.0 | 0.0 | |
9 months ago | 7 months ago | |
Python | Python | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
win32-shellcode
pyWhat
-
Go Library like PyWhat?
Is there a library written in Go similar to PyWhat? I want to use a subset of the functionality for a simple go program I'm writing. I could just call PyWhat, link to lemmeknow, or even write a simple go implementation myself, but I wanted to ask if there was a pure go implementation. Thanks!
-
lemmeknow v0.7.0 is here with support for identifying bytes with help of regex crate!
Lemmeknow is basically used for identifying text as mentioned in README and video. It is Rust implementation of PyWhat. You can see various usecases there too.
-
lemmeknow - The fastest way to identify anything!
For rarity, we have got the database from pyWhat and the wiki says:
-
lemmeknow - the fastest way to identify anything!
This project was inspired by u/beesec 's pyWhat
- Tips for Making a Popular Open-Source Project in 2021 [Ultimate Guide]
- PyWhat - Identify Anything
- PyWhat - Identify Anything. Easily identify API keys, secrets, cryptocurrency wallets and more.
-
Is there an application or way to find hashes?
Do you mean something like this: https://github.com/bee-san/pyWhat
- Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is
-
IT Pro Tuesday #155 - Carrier Lookup, Network Podcast, Identification Tool & More
pyWhat enables you to easily identify emails, IP addresses and more. Feed it a .pcap file or some mysterious text or hex of a file, and it will tell you what it is. The tool is recursive, so it can identify everything in text, files and more. A shout out to the tool's author for sharing his creation.
What are some alternatives?
flare-floss - FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
arkime - Arkime is an open source, large scale, full packet capturing, indexing, and database system.
yaralyzer - Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.
BruteShark - Network Analysis Tool
theZoo - A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
chepy - Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
gef - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
TryHackMe - This is a repository containing TryHackMe Writeups in Somali language on various of rooms & challenges, including notes, files and solutions.
usaddress - :us: a python library for parsing unstructured United States address strings into address components
dumpulator - An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in general (sandboxing).
maltrail - Malicious traffic detection system
DataProfiler - What's in your data? Extract schema, statistics and entities from datasets