~alienagain/curious_butterfly

91dec68c8f151d54586f5bc5f44f6018499193e7 — terceranexus6 7 months ago fcf04d9
adding gif instead
2 files changed, 0 insertions(+), 1 deletions(-)

M README.md
A images/ezgif-4-fdff4c23fc.gif
M README.md => README.md +0 -1
@@ 17,4 17,3 @@ chmod u+x cubu

A pop up will appear. The example provided is Sparkling Goblin, a threat actor. The `.raku` script is based on strings inside malware samples of Sparkling Goblin. If entered the folder (`samples` in this case) and the threat name (`sparkling_goblin` in this case), a file would be generated with coincidences found, and written in a file which name that looks like `results_<threat name>` in this case `results_sparkling_goblin`.

![](https://files.mastodon.green/media_attachments/files/109/183/507/535/247/310/original/80a53b9fb704ea68.mp4)

A images/ezgif-4-fdff4c23fc.gif => images/ezgif-4-fdff4c23fc.gif +0 -0