In this update, you can also save your library with custom regular expressions in the working directory (in prior versions, it would only take it from the application directory).
Here is an example with a regular expression for MAC addresses:
And there’s a small fix for URL regex: a – character was not considered to be part of the query of a URL.
re-search_V0_0_13.zip (https)
MD5: 241464482856756FF1C0C2386AF84CD5
SHA256: 9409EC639C4C6E988ADFC2401CA89200712BE171894D214B56E4ACC84C32E489
[…] Update: re-search.py Version 0.0.13 […]
Pingback by Week 11 – 2019 – This Week In 4n6 — Sunday 17 March 2019 @ 0:58
[…] Update: re-search.py Version 0.0.13 […]
Pingback by Overview of Content Published in March | Didier Stevens — Monday 1 April 2019 @ 0:00
[…] C7 45 10 64 63 62 61. I can write a regular expression for this instruction, and use my tool re-search.py to extract it from the binary shellcode. I want at least 2 consecutive mov … instructions: […]
Pingback by Extracting “Stack Strings” from Shellcode | Didier Stevens — Saturday 20 April 2019 @ 0:00
[…] strings.py, oledump.py, zipdump.py, re-search.py, rtfdump.py and shellcode emulator […]
Pingback by Doc & RTF Malicious Document – Didier Stevens Videos — Tuesday 26 January 2021 @ 23:42