I added a new option to file-magic.py to limit identification to the custom definitions: -C.
file-magic_V0_0_4.zip (https)
MD5: CCF170F09B1442D27AE6519A0BB0CBAB
SHA256: F240BAEE78C8AE4DB29724D8A8F2A5DEDEFE47570219D700FB3BB9A6707432BB
I added a new option to file-magic.py to limit identification to the custom definitions: -C.
file-magic_V0_0_4.zip (https)
MD5: CCF170F09B1442D27AE6519A0BB0CBAB
SHA256: F240BAEE78C8AE4DB29724D8A8F2A5DEDEFE47570219D700FB3BB9A6707432BB
RSS feed for comments on this post. TrackBack URI
This site uses Akismet to reduce spam. Learn how your comment data is processed.
[…] Update: file-magic.py Version 0.0.4 […]
Pingback by Overview of Content Published in October | Didier Stevens — Friday 2 November 2018 @ 0:01
[…] This JSON output contains all the selected byte sequences (BASE64 encoded and with metadata), and it can be piped into tools that accept this format, like file-magic.py: […]
Pingback by Update: cut-bytes.py Version 0.0.8 | Didier Stevens — Monday 12 November 2018 @ 0:00
[…] my tool file-magic.py, I get confirmation that this is a sound file (.WAV) with 16-bit PCM […]
Pingback by Steganography and Malware | Didier Stevens — Tuesday 12 November 2019 @ 0:00
[…] Tools: zipdump.py, pecheck.py, file-magic.py. […]
Pingback by Analyzing Unusual ZIP Files – Didier Stevens Videos — Wednesday 1 January 2020 @ 13:08
[…] format-bytes.py, pecheck.py, file-magic.py, […]
Pingback by Stego & Cryptominers – Didier Stevens Videos — Sunday 2 February 2020 @ 13:07