~alienagain/curious_butterfly

fcf04d90d190b10b8dccc2eb02653551c10061e0 — terceranexus6 7 months ago 83b3611
adding a video in readme
1 files changed, 2 insertions(+), 0 deletions(-)

M README.md
M README.md => README.md +2 -0
@@ 16,3 16,5 @@ chmod u+x cubu
```

A pop up will appear. The example provided is Sparkling Goblin, a threat actor. The `.raku` script is based on strings inside malware samples of Sparkling Goblin. If entered the folder (`samples` in this case) and the threat name (`sparkling_goblin` in this case), a file would be generated with coincidences found, and written in a file which name that looks like `results_<threat name>` in this case `results_sparkling_goblin`.

![](https://files.mastodon.green/media_attachments/files/109/183/507/535/247/310/original/80a53b9fb704ea68.mp4)