Skip to content

Instantly share code, notes, and snippets.

@m417z
Created July 11, 2020 15:42
Show Gist options
  • Star 4 You must be signed in to star a gist
  • Fork 3 You must be signed in to fork a gist
  • Save m417z/446bf0532c201cfda53ccbac16bc9f66 to your computer and use it in GitHub Desktop.
Save m417z/446bf0532c201cfda53ccbac16bc9f66 to your computer and use it in GitHub Desktop.
@nutterthanos
Copy link

nutterthanos commented Nov 20, 2020

how to get this to work? what version of python do you need?
image
@m417z

@m417z
Copy link
Author

m417z commented Nov 20, 2020

It doesn't work anymore since VirusTotal added anti-automation measures to their website. You can either bypass them, or use the browser and sniff the timestamp manually with e.g. Fiddler.

@nutterthanos
Copy link

ok is it possible to remove the part that has the connect to virustotal so i can get only the sha256? @m417z

@nutterthanos
Copy link

image

@nutterthanos
Copy link

how do you bypass that?

@m417z
Copy link
Author

m417z commented Nov 21, 2020

get only the sha256

Just add a line with print(file_hash) after the line:
file_hash = base64.b64decode(file_hash_base64).hex()

how do you bypass that?

They send specific headers that they check on the server. You can sniff the traffic and then send exactly the same headers as they send.

@nutterthanos
Copy link

nutterthanos commented Nov 24, 2020

well how? i tried and python did not work connecting

@zouxianyu
Copy link

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment