~alienagain/curious_butterfly

5e18a2a282a55721b1a911e6fed452a224371b4e — terceranexus6 7 months ago 91dec68
adding gif instead in readme
1 files changed, 1 insertions(+), 1 deletions(-)

M README.md
M README.md => README.md +1 -1
@@ 16,4 16,4 @@ chmod u+x cubu
```

A pop up will appear. The example provided is Sparkling Goblin, a threat actor. The `.raku` script is based on strings inside malware samples of Sparkling Goblin. If entered the folder (`samples` in this case) and the threat name (`sparkling_goblin` in this case), a file would be generated with coincidences found, and written in a file which name that looks like `results_<threat name>` in this case `results_sparkling_goblin`.

![](https://im4.ezgif.com/tmp/ezgif-4-fdff4c23fc.gif)