Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
@nutterthanos

This comment has been minimized.

Copy link

@nutterthanos nutterthanos commented Nov 20, 2020

how to get this to work? what version of python do you need?
image
@m417z

@m417z

This comment has been minimized.

Copy link
Owner Author

@m417z m417z commented Nov 20, 2020

It doesn't work anymore since VirusTotal added anti-automation measures to their website. You can either bypass them, or use the browser and sniff the timestamp manually with e.g. Fiddler.

@nutterthanos

This comment has been minimized.

Copy link

@nutterthanos nutterthanos commented Nov 21, 2020

ok is it possible to remove the part that has the connect to virustotal so i can get only the sha256? @m417z

@nutterthanos

This comment has been minimized.

Copy link

@nutterthanos nutterthanos commented Nov 21, 2020

image

@nutterthanos

This comment has been minimized.

Copy link

@nutterthanos nutterthanos commented Nov 21, 2020

how do you bypass that?

@m417z

This comment has been minimized.

Copy link
Owner Author

@m417z m417z commented Nov 21, 2020

get only the sha256

Just add a line with print(file_hash) after the line:
file_hash = base64.b64decode(file_hash_base64).hex()

how do you bypass that?

They send specific headers that they check on the server. You can sniff the traffic and then send exactly the same headers as they send.

@nutterthanos

This comment has been minimized.

Copy link

@nutterthanos nutterthanos commented Nov 24, 2020

well how? i tried and python did not work connecting

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.