Open source tools I have developed. Comments, questions, and suggestions; send me an email. |
c0de
incognito.py
Description Incognito is a tool for downloading URLs via the TOR network. There are two modes of operation: CLI and class for customization in scripts. Requirements Python TOR Syntax Incognito CLI mece@funkenstein:~/development$ ./incognito.py Usage: incognito.py <option> Options: --url --file mece@funkenstein:~/development$ Using Incognito as a Class >>> import incognito >>> nito = incognito.Incognito() >>> urlContent = nito.GetContent(url) Download --> incognito.py |
vtquery.py
Description VTquery is a command line tool for search VirtusTotal. It has two input options for searching based on a SHA256 hash or the file itself. Syntax mece@strongbad:~/development$ ./vtquery.py Usage: vtquery.py <option> Options: --hash <SHA256 HASH> --file <BINARY> mece@strongbad:~/development$ Requirements Python Sample Output mece@strongbad:~/development$ ./vtquery.py --file video.exe SHA256 SUM: 849ac0f4da20564c039e2311645cdd30aa859d3a5d142f7156ee696ae7e23983 File Name: N/A Detect Ratio: 8 / 43 Analysis Date: 2010-09-20 18:27:53 UTC CAT-QuickHeal: (Suspicious) - DNAScan McAfee: FakeAlert-SpyPro.gen.ak NOD32: Win32/Adware.SpywareProtect2009 F-Secure: Suspicious:W32/Malware!Gemini TrendMicro: PAK_Generic.012 McAfee-GW-Edition: Heuristic.LooksLike.Trojan.Crypt.ZPACK.B Prevx: High Risk Cloaked Malware AhnLab-V3: Trojan/Win32.Zbot mece@strongbad:~/development$ Download --> vtquery.py |
peslice.py
Description
PEslice is a Windows PE32 Portable Executable (PE) parser/analyzer/extractor. It can either be run from command line or imported as a class into another program. The goal of PEslice is to provide a quick method for extracting information from Windows executable files on the Linux platform.
Syntax
Usage: peslice.py <exe/dll> <option>
>>> import peslice
>>> pslice = peslice.peslice("putty.exe")
>>> pe = pslice.pe
help(peslice) lists all the available classes/functions and the required parameters.
Requirements
Python
PEfile
Sample Output
PE32 Headers: dos = DOS HEADER file = FILE HEADER nt = NT HEADERS optional = OPTIONAL HEADER Options: --check = Check if binary is a DLL or EXE --data = List allocated and unallocated data directories --export = List Export Address Table (EAT) --field=HEADER = List all fields in header --get=HEADER <field> = Retrieve field value from header --import = List Import Address Table (IAT) --sections = List all sections mece@strongbad:~/development$ ./peslice.py putty.exe --get=optional addressofentrypoint
AddressOfEntryPoint=0x49cdf
mece@strongbad:~/development$
Download --> peslice.py |
geolocate.py
Description Geolocate is a part of a project called Felix that I started working on a few years ago. It queries api.hostip.info for geographical information based on the provided IP address. Requirements Python Syntax Usage: geolocate <option> ipaddress|file Options: --file = Read IP Addresses in a file Sample Output mece@strongbad:~/development/felix$ ./geolocate.py 202.69.89.2 202.69.89.2 HONG KONG HK mece@strongbad:~/development/felix$ Download --> geolocate.py |
ocquery.py
Description Ocquery is a command line tool for querying Offensive Computing.Requirements Python BeautifulSoup Syntax Usage: ocquery <md5sum> Sample Output MD5SUM: 0eecd17c6c215b358b7b872b74bfd800 Original Submitted Filename: 0eecd17c6c215b358b7b872b74bfd800 Date Added: 2011-11-08 12:41:10.901192 Download --> ocquery.py |
1-5 of 5