Skip to content

Instantly share code, notes, and snippets.

@zmallen
zmallen / lookup.py
Last active December 9, 2016 01:25
from pygraylog.graylogapi import GraylogAPI
import base64
import datetime
import requests
url = 'http://graylog-url.com'
username = 'USERNAME'
password = 'PASSWORD'
def build_data_dict():
feed_file = 'dga-feed.txt'
# Simulate fake processes of analysis sandbox/VM that some malware will try to evade
# This just spawn ping.exe with different names (wireshark.exe, vboxtray.exe, ...)
# It's just a PoC and it's ugly as f*ck but hey, if it works...
# Usage: .\fake_sandbox.ps1 -action {start,stop}
param([Parameter(Mandatory=$true)][string]$action)
$fakeProcesses = @("wireshark.exe", "vmacthlp.exe", "VBoxService.exe",
"VBoxTray.exe", "procmon.exe", "ollydbg.exe", "vmware-tray.exe",
@hillar
hillar / flatten_json.lua
Last active August 29, 2015 14:11
heka :: flatten json before injecting message
require "cjson"
local util = require("util")
-- https://github.com/mozilla-services/lua_sandbox/blob/master/modules/util.lua
local message = {
Type = "IGNORE",
Fields = {}
}