Exemple #1
0
  - Retrieve an analysis report from PDF Examiner of a PDF file identified by its hash value:
$ python3 malsub.py -a pe -r <hash>

  - Download a malware sample from MalShare:
$ python3 malsub.py -a ms -d <hash>

Copyright (c) 2017 Diogo Fernandes
https://github.com/diogo-fern/malsub
"""

from docopt import docopt

from malsub.core import main

exit(main.run(docopt(__doc__)))

# notes
# pyflakes, pylint, pychecker, and pep8
# CONTRIBUTING.md

# password-protected samples
# compression

# read file or files from pipe? stdin
# find malware_samples/ -exec cat {} \; | malsub

# interactive console
# history of commands and output
# cache stuff
# submit a sample
Exemple #2
0
  - Retrieve an analysis report from PDF Examiner of a PDF file identified by
    its hash value:
$ python3 malsub.py -a pe -r <hash>

  - Download a malware sample from MalShare:
$ python3 malsub.py -a ms -d <hash>

Copyright (c) 2017 Diogo Fernandes
https://github.com/diogo-fern/malsub
"""

from docopt import docopt, printable_usage

from malsub.core import main

exit(main.run(docopt(__doc__), printable_usage(__doc__)))

# https://malwareconfig.com/api/
# http://www.cryptam.com/
# https://github.com/mwtracker/cryptam_tools

# notes
# pyflakes, pylint, pychecker, and pep8
# CONTRIBUTING.md

# -b
# open URLs in the browser

# make groups
# -g mal
# -g intel