91dec68c8f151d54586f5bc5f44f6018499193e7 — terceranexus6 1 year, 7 months ago fcf04d9
adding gif instead
2 files changed, 0 insertions(+), 1 deletions(-)

A images/ezgif-4-fdff4c23fc.gif
M README.md => README.md +0 -1
@@ 17,4 17,3 @@ chmod u+x cubu

A pop up will appear. The example provided is Sparkling Goblin, a threat actor. The `.raku` script is based on strings inside malware samples of Sparkling Goblin. If entered the folder (`samples` in this case) and the threat name (`sparkling_goblin` in this case), a file would be generated with coincidences found, and written in a file which name that looks like `results_<threat name>` in this case `results_sparkling_goblin`.


A images/ezgif-4-fdff4c23fc.gif => images/ezgif-4-fdff4c23fc.gif +0 -0