def testName(self): file = PE.get('chrome.exe') print cert.getCert(file)
from modules import suspicious_sections from modules import analyzePattern if __name__ == "__main__": if len(sys.argv) == 3: # ./muhafiz --antidbg file_path_include_malware if os.path.exists(sys.argv[2]): suspicious_file = PE.get(sys.argv[2]) if sys.argv[1] == "--antidbg": pass elif sys.argv[1] == "--antivm": pass elif sys.argv[1] == "--cert": for key, value in cert.getCert(suspicious_file).iteritems(): print key, value elif sys.argv[1] == "--dir-import": print "DIRECTORY IMPORT" print directory.get_import(suspicious_file) elif sys.argv[1] == "--dir-export": print "DIRECTORY EXPORT" print directory.get_export(suspicious_file) elif sys.argv[1] == "--dir-resource": print "DIRECTORY RESOURCE" print directory.get_resource(suspicious_file) elif sys.argv[1] == "--dir-debug":