Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
@nutterthanos

This comment has been minimized.

Copy link

@nutterthanos nutterthanos commented Nov 20, 2020

how to get this to work? what version of python do you need?
image
@m417z

@m417z

This comment has been minimized.

Copy link
Owner Author

@m417z m417z commented Nov 20, 2020

It doesn't work anymore since VirusTotal added anti-automation measures to their website. You can either bypass them, or use the browser and sniff the timestamp manually with e.g. Fiddler.

@nutterthanos

This comment has been minimized.

Copy link

@nutterthanos nutterthanos commented Nov 21, 2020

ok is it possible to remove the part that has the connect to virustotal so i can get only the sha256? @m417z

@nutterthanos

This comment has been minimized.

Copy link

@nutterthanos nutterthanos commented Nov 21, 2020

image

@nutterthanos

This comment has been minimized.

Copy link

@nutterthanos nutterthanos commented Nov 21, 2020

how do you bypass that?

@m417z

This comment has been minimized.

Copy link
Owner Author

@m417z m417z commented Nov 21, 2020

get only the sha256

Just add a line with print(file_hash) after the line:
file_hash = base64.b64decode(file_hash_base64).hex()

how do you bypass that?

They send specific headers that they check on the server. You can sniff the traffic and then send exactly the same headers as they send.

@nutterthanos

This comment has been minimized.

Copy link

@nutterthanos nutterthanos commented Nov 24, 2020

well how? i tried and python did not work connecting

@zouxianyu

This comment has been minimized.

Copy link

@zouxianyu zouxianyu commented Feb 5, 2021

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment