Posts Tagged ‘Python’

Run Your Web Apps On Google’s Infrastructure

Monday, November 7th, 2011

Google App Engine enables you to build and host web apps on the same systems that power Google applications. App Engine offers fast development and deployment; simple administration, with no need to worry about hardware, patches or backups; and effortless scalability.


Getting Started With Python And Google App Engine

Thursday, July 14th, 2011

This tutorial describes how to develop and deploy a simple Python project with Google App Engine. The example project, a guest book, demonstrates how to use the Python runtime environment, and how to use several App Engine services, including the datastore and the Google user service.


The Python Tutorial

Wednesday, April 27th, 2011

Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python’s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.

This tutorial does not attempt to be comprehensive and cover every single feature, or even every commonly used feature. Instead, it introduces many of Python’s most noteworthy features, and will give you a good idea of the language’s flavor and style. After reading it, you will be able to read and write Python modules and programs, and you will be ready to learn more about the various Python library modules described in The Python Standard Library.

Link: Python

Malware Cookbook Tools Online

Sunday, April 24th, 2011

For all the folks who bought DVD-less Kindle versions of the cookbook, all the folks who received a DVD with their paper copy but want updates to the tools, and even for folks who just want to experiment with the tools without buying the book, please feel free to download with an SVN client here:

In order by Chapter, here’s a quick description of what’s on the DVD. It also includes, the set of Volatility plugins for the upcoming 1.4 release, a bunch of sample memory dumps from malware infected systems, and full color images for screen shots in the book.

* Multi-platform TOR-enabled URL
* wwwhoney.tgz: CGI scripts to accept submissions from nepenthes and dionaea honeypots
* Convert ClamAV antivirus signatures to YARA rules
* Convert PEiD packer signatures to YARA rules
* Script to implement your own antivirus multi-scanner
* Detect malicious PE file attributes
* Detect self-mutating code on live Windows systems using ssdeep
* Command-line interface to VirusTotal, ThreatExpert, Jotti, and NoVirusThanks
* Malware artifacts database manager
* Application to scan live Windows systems for artifacts (files, Registry keys, mutexes) left by malware
* Create static PNG images of IP addresses plotted on a map using GeoIP
* Create dynamic/interactive geographical maps of IP addresses using Google charts
* Script to produce disassemblies (via DiStorm) of shellcode and optionally apply an XOR mask
* Python class for automating malware execution in VirtualBox and VMware guests
* Sample automation script for VirtualBox based on
* Sample automation script for VMware based on
* Python class for building sandboxes with support for analyzing network traffic, packet captures, and memory
* RegFsNotify.exe: Tool to detect changes to the Registry and file system in real time (from user mode without API hooks)
* HandleDiff.exe: Tool to detect changes to the handle tables of all processes on a system (useful to analyze the side-effects of code injecting malware)
* Kernel driver for monitoring notification routines, preventing processes from terminating, preventing files from being deleted, and preventing other drivers from loading
* cmd.exe: Custom command shell (cmd.exe) for logging malware activity and backdoor activity
* tsk-xview.exe: Cross-view based rootkit detection tool based on The Sleuth Kit API and Microsoft’s Offline Registry API
* HTMLInjection Detector.exe: Detect HTML injection attacks on banking and financial websites
* RegRipper plug-in for printing a computer’s routing table
* RegRipper plug-in for printing files that are pending deletion
* RegRipper plug-in for printing processes that malware prevents from running
* RegRipper plug-in for printing ShellExecute hooks (a method of DLL injection)
* Parse::Win32Registry module to extract and examine cryptography certificates stored in Registry hives
* Parse::Win32Registry module for finding hidden binary data in the Registry
* scloader.exe: Executable wrapper for launching shell code in a debugger
* Immunity Debugger PyCommand for finding shellcode in arbitrary binary files
* Immunity Debugger PyCommand for finding Inline-style user mode API hooks
* WinAppDbg plug-in for monitoring API calls, alerting on suspicious flags/parameters and producing an HTML report
* Python library for encoding/decoding XOR, including brute force methods and automated YARA signature generation
* Immunity Debugger PyCommand for assistance when rebuilding import tables with Import REconstructor
* Immunity Debugger PyCommand for cracking Kraken’s Domain Generation Algorithm (DGA)
* Immunity Debugger PyCommand for decrypting Silent Banker strings
* rundll32ex.exe: Extended version of rundll32.exe that allows you to run DLLs in other processes, call exported functions, and pass parameters
* install_svc.bat: Batch script for installing a service DLL (for dynamic analysis of the DLL)
* Python script for installing a service DLL and supplying optional arguments to the service
* Python script for converting a DLL into a standalone executable
* DriverEntryFinder: Kernel driver to find the correct address in kernel memory to set breakpoints for catching new drivers as they load
* Python script to convert WinDbg output into data that can be imported into IDA
* WinDbgNotify.txt: WinDbg script for identifying malicious notification routines

Link: MNIN Security