-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
#92 Ability to Add Files to Extraction #96
base: master
Are you sure you want to change the base?
Conversation
Thanks for contribution! If you want you can easily lint your changes to pass our pipeline using https://github.com/CERT-Polska/lint-python-action tool (it's recommended to use it within virtualenv as it installs tools in specific pinned versions)
But if you don't feel comfortable with that, don't worry, I can do this for you before merge. |
Co-authored-by: Paweł Srokosz <psrok1@gmail.com>
Hey, I made these changes let me know if they look good to you 😄 |
Hi! Sorry that it takes so long. Meanwhile something very similar has been implemented in #101 (based on #99). In this implementation, binaries are put directly in configuration, following the specific scheme (in We also plan to support adding parts of config imperatively, so extractor interface will be like that: self.config.add_binary(
filename="example.bin",
data=b'\0'*4 Let me know if it suits your needs. We can also implement |
Based on #92, These changes allow us to not only extract configuration information from malware but also additional files that we may have extracted statically. This is not only great for static unpacking, but also other binary data you may wish to extract for analysis or put back into the karon queue for processing.
The files object is a sha256 hash uniquely representing the file then the data and an optional filename.