{"id":32514,"date":"2024-03-27T09:54:23","date_gmt":"2024-03-27T09:54:23","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=32514"},"modified":"2024-03-27T09:54:27","modified_gmt":"2024-03-27T09:54:27","slug":"dotnet-metadata","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/","title":{"rendered":"DotNet-MetaData : A Deep Dive Into .NET Malware Analysis"},"content":{"rendered":"\n<p>&#8220;DotNet-MetaData: A Deep Dive into .NET Malware Analysis&#8221; unveils the advanced techniques for analyzing and classifying .NET-based malware. <\/p>\n\n\n\n<p>With a focus on practical tools like Yara rules and Python scripts, this guide provides cybersecurity professionals with the means to extract crucial metadata from .NET binaries, enhancing their malware hunting and classification capabilities. <\/p>\n\n\n\n<p>Explore how to leverage these tools for detailed insights into the inner workings of malware samples.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>DotNetMetadata.yar<\/strong><a href=\"https:\/\/github.com\/bartblaze\/DotNet-MetaData#dotnetmetadatayar\"><\/a><\/h2>\n\n\n\n<p>Yara rule to display binary information to the console. Example use:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>yara64.exe DotNetMetadata.yar c:\\fakepath\\all_samples<\/code><\/pre>\n\n\n\n<p>The Yara rule requires at least Yara 4.2.0, that said, it&#8217;s <a href=\"https:\/\/github.com\/VirusTotal\/yara\/releases\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">always <\/a>recommended to get the latest release.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>DotNetMetadata.py<\/strong><a href=\"https:\/\/github.com\/bartblaze\/DotNet-MetaData#dotnetmetadatapy\"><\/a><\/h2>\n\n\n\n<p>Python script to extract the GUID, MVID, TYPELIB, and Assembly Name of .NET binaries. Example use:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>python DotNetMetadata.py c:\\fakepath\\all_samples -c samples_output.csv<\/code><\/pre>\n\n\n\n<p>The Python script requires pythonnet to be installed (<code>pip install pythonnet<\/code>) and expects&nbsp;<code>dnlib.dll<\/code>&nbsp;to be in the same directory.<\/p>\n\n\n\n<p>Get and <a href=\"https:\/\/github.com\/0xd4d\/dnlib\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">compile <\/a>dnlib from\u00a0or download dnSpy-netframework.zip from. The script should work correctly from dnlib version 3.3.2.0 up to and <a href=\"https:\/\/github.com\/dnSpyEx\/dnSpy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">including <\/a>4.4.0.0.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Sample Rules<\/strong><a href=\"https:\/\/github.com\/bartblaze\/DotNet-MetaData#sample-rules\"><\/a><\/h2>\n\n\n\n<p>This folder contains sample rules described in the blog post. Do tweak and update according to your needs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example Output<\/strong><a href=\"https:\/\/github.com\/bartblaze\/DotNet-MetaData#example-output\"><\/a><\/h2>\n\n\n\n<p>Example output for a single file &#8220;Mpyiuepnw&#8221;, a version of PureLogStealer with SHA256 hash: c201449a0845d659c32cc48f998b8cc95c20153bb1974e3a1ba80c53a90f1b27<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Using The Yara Rule:<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>$ yara64.exe DotNetMetadata.yar c:\\fakepath\\Mpyiuepnw.vir\r\nOriginal Filename: Mpyiuepnw.exe\r\nInternal Name: Mpyiuepnw.exe\r\nImphash (use with caution): f34d5f2d4577ed6d9ceec516c1f5a744\r\nCompile timestamp (epoch): 1710224522\r\nModule name: Mpyiuepnw.exe\r\nAssembly name: Mpyiuepnw\r\nTypelib: 856e9a70-148f-4705-9549-d69a57e669b0\r\n# of GUIDs: 1\r\ndotnet.guid: 0\r\n -> guid (MVID) = 9066ee39-87f9-4468-9d70-b57c25f29a67\r\n# of streams: 5\r\n# of resources is: 9\r\ndotnet.resource: 0\r\n -> name = Rdfeunq.Properties.Resources.resources\r\n -> offset = 715528\r\n -> length = 2818774\r\ndotnet.resource: 1\r\n -> name = Mpyiuepnw.Attributes.WrapperManager.resources\r\n -> offset = 3534306\r\n -> length = 180\r\ndotnet.resource: 2\r\n -> name = Mpyiuepnw.Collections.ImporterHelperCollection.resources\r\n -> offset = 3534490\r\n -> length = 180\r\ndotnet.resource: 3\r\n -> name = Mpyiuepnw.Roles.ConfigOrderRole.resources\r\n -> offset = 3534674\r\n -> length = 2932\r\ndotnet.resource: 4\r\n -> name = Mpyiuepnw.Roles.CodeManager.resources\r\n -> offset = 3537610\r\n -> length = 2933\r\ndotnet.resource: 5\r\n -> name = NAudio.Pages.TemplateAuthenticationPage.resources\r\n -> offset = 3540547\r\n -> length = 180\r\ndotnet.resource: 6\r\n -> name = Mpyiuepnw.Roles.SchemaManager.resources\r\n -> offset = 3540731\r\n -> length = 2936\r\ndotnet.resource: 7\r\n -> name = Mpyiuepnw.Polices.SingletonSingleton.resources\r\n -> offset = 3543671\r\n -> length = 180\r\ndotnet.resource: 8\r\n -> name = NAudio.Common.PrototypeSingleton.resources\r\n -> offset = 3543855\r\n -> length = 180\r\n# of module references: 7\r\n# of strings: 710<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Using The Python Script:<\/strong><a href=\"https:\/\/github.com\/bartblaze\/DotNet-MetaData#using-the-python-script\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Single File<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>$ python DotNetMetadata.py c:\\fakepath\\Mpyiuepnw.vir\r\nFile: c:\\fakepath\\Mpyiuepnw.vir\r\n  Assembly Name: Mpyiuepnw\r\n  MVID: 9066ee39-87f9-4468-9d70-b57c25f29a67\r\n  GUID: 856e9a70-148f-4705-9549-d69a57e669b0<\/code><\/pre>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/bartblaze\/DotNet-MetaData\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;DotNet-MetaData: A Deep Dive into .NET Malware Analysis&#8221; unveils the advanced techniques for analyzing and classifying .NET-based malware. With a focus on practical tools like Yara rules and Python scripts, this guide provides cybersecurity professionals with the means to extract crucial metadata from .NET binaries, enhancing their malware hunting and classification capabilities. Explore how to [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":32528,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6656,6321,6052,6325],"class_list":["post-32514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-dotnet-metadata","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DotNet-MetaData : A Deep Dive Into .NET Malware Analysis<\/title>\n<meta name=\"description\" content=\"&quot;DotNet-MetaData: A Deep Dive into .NET Malware Analysis&quot; unveils the advanced techniques for analyzing and classifying .NET-based malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DotNet-MetaData : A Deep Dive Into .NET Malware Analysis\" \/>\n<meta property=\"og:description\" content=\"&quot;DotNet-MetaData: A Deep Dive into .NET Malware Analysis&quot; unveils the advanced techniques for analyzing and classifying .NET-based malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-27T09:54:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-27T09:54:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"DotNet-MetaData : A Deep Dive Into .NET Malware Analysis\",\"datePublished\":\"2024-03-27T09:54:23+00:00\",\"dateModified\":\"2024-03-27T09:54:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/\"},\"wordCount\":233,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp\",\"keywords\":[\"cybersecurity\",\"DotNet-MetaData\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/\",\"name\":\"DotNet-MetaData : A Deep Dive Into .NET Malware Analysis\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp\",\"datePublished\":\"2024-03-27T09:54:23+00:00\",\"dateModified\":\"2024-03-27T09:54:27+00:00\",\"description\":\"\\\"DotNet-MetaData: A Deep Dive into .NET Malware Analysis\\\" unveils the advanced techniques for analyzing and classifying .NET-based malware.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DotNet-MetaData : A Deep Dive Into .NET Malware Analysis","description":"\"DotNet-MetaData: A Deep Dive into .NET Malware Analysis\" unveils the advanced techniques for analyzing and classifying .NET-based malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/","og_locale":"en_US","og_type":"article","og_title":"DotNet-MetaData : A Deep Dive Into .NET Malware Analysis","og_description":"\"DotNet-MetaData: A Deep Dive into .NET Malware Analysis\" unveils the advanced techniques for analyzing and classifying .NET-based malware.","og_url":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-03-27T09:54:23+00:00","article_modified_time":"2024-03-27T09:54:27+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"DotNet-MetaData : A Deep Dive Into .NET Malware Analysis","datePublished":"2024-03-27T09:54:23+00:00","dateModified":"2024-03-27T09:54:27+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/"},"wordCount":233,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp","keywords":["cybersecurity","DotNet-MetaData","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/","url":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/","name":"DotNet-MetaData : A Deep Dive Into .NET Malware Analysis","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp","datePublished":"2024-03-27T09:54:23+00:00","dateModified":"2024-03-27T09:54:27+00:00","description":"\"DotNet-MetaData: A Deep Dive into .NET Malware Analysis\" unveils the advanced techniques for analyzing and classifying .NET-based malware.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20(2).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":31568,"url":"https:\/\/kalilinuxtutorials.com\/mastering-yara-a-comprehensive-guide-to-detection-engineering-and-rule-development\/","url_meta":{"origin":32514,"position":0},"title":"Mastering YARA: A Comprehensive Guide to Detection Engineering and Rule Development","author":"Varshini","date":"December 21, 2023","format":false,"excerpt":"Threat identification and analysis are very important for keeping systems and networks safe in the ever-changing world of cybersecurity. YARA is an open-source tool that has become an essential tool for cybersecurity experts. It can be used to identify and classify malware samples. This article is a complete guide that\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUHUhMTOqEOhUe2teYhC6jhR6CQHyzZU7K782kZ8-iH4MMq6loLLVNAAj76UadJ-MMaQMDJE36jJMzJzU4qyBplFpLOrMdCFkR6mV-ygRrg_1B8lxaUs9CW9bgISKjh9XEm3tXmwsjm9XJ_iiy_gCFxTgH61KiqiOEvswr_Tcw_V8aPBelZ8EOtCzd2Q\/s16000\/yara.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUHUhMTOqEOhUe2teYhC6jhR6CQHyzZU7K782kZ8-iH4MMq6loLLVNAAj76UadJ-MMaQMDJE36jJMzJzU4qyBplFpLOrMdCFkR6mV-ygRrg_1B8lxaUs9CW9bgISKjh9XEm3tXmwsjm9XJ_iiy_gCFxTgH61KiqiOEvswr_Tcw_V8aPBelZ8EOtCzd2Q\/s16000\/yara.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUHUhMTOqEOhUe2teYhC6jhR6CQHyzZU7K782kZ8-iH4MMq6loLLVNAAj76UadJ-MMaQMDJE36jJMzJzU4qyBplFpLOrMdCFkR6mV-ygRrg_1B8lxaUs9CW9bgISKjh9XEm3tXmwsjm9XJ_iiy_gCFxTgH61KiqiOEvswr_Tcw_V8aPBelZ8EOtCzd2Q\/s16000\/yara.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUHUhMTOqEOhUe2teYhC6jhR6CQHyzZU7K782kZ8-iH4MMq6loLLVNAAj76UadJ-MMaQMDJE36jJMzJzU4qyBplFpLOrMdCFkR6mV-ygRrg_1B8lxaUs9CW9bgISKjh9XEm3tXmwsjm9XJ_iiy_gCFxTgH61KiqiOEvswr_Tcw_V8aPBelZ8EOtCzd2Q\/s16000\/yara.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUHUhMTOqEOhUe2teYhC6jhR6CQHyzZU7K782kZ8-iH4MMq6loLLVNAAj76UadJ-MMaQMDJE36jJMzJzU4qyBplFpLOrMdCFkR6mV-ygRrg_1B8lxaUs9CW9bgISKjh9XEm3tXmwsjm9XJ_iiy_gCFxTgH61KiqiOEvswr_Tcw_V8aPBelZ8EOtCzd2Q\/s16000\/yara.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUHUhMTOqEOhUe2teYhC6jhR6CQHyzZU7K782kZ8-iH4MMq6loLLVNAAj76UadJ-MMaQMDJE36jJMzJzU4qyBplFpLOrMdCFkR6mV-ygRrg_1B8lxaUs9CW9bgISKjh9XEm3tXmwsjm9XJ_iiy_gCFxTgH61KiqiOEvswr_Tcw_V8aPBelZ8EOtCzd2Q\/s16000\/yara.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36140,"url":"https:\/\/kalilinuxtutorials.com\/whacamole\/","url_meta":{"origin":32514,"position":1},"title":"WhacAMole : A Comprehensive Malware Analysis Tool","author":"Varshini","date":"February 6, 2025","format":false,"excerpt":"WhacAMole (WAM) is a cutting-edge tool designed for in-depth memory and process analysis to detect, investigate, and document anomalies caused by malware. It offers unparalleled capabilities for cybersecurity professionals to uncover hidden threats and analyze suspicious behaviors within system processes. Here\u2019s an overview of its functions and features: Core Functionality\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/WhacAMole-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/WhacAMole-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/WhacAMole-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/WhacAMole-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/WhacAMole-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/WhacAMole-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36372,"url":"https:\/\/kalilinuxtutorials.com\/yara-x-v0-13-0\/","url_meta":{"origin":32514,"position":2},"title":"YARA-X v0.13.0 : Elevating Malware Analysis With New Tools And Enhanced Features","author":"Varshini","date":"February 12, 2025","format":false,"excerpt":"The release of YARA-X v0.13.0 introduces several enhancements, bug fixes, and new tools aimed at improving the functionality and user experience of this malware analysis framework. Below is a detailed breakdown of the key updates in this version. Key Features And Updates Basic Linting with the check CommandA basic linting\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YARA-X-v0.13.0.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YARA-X-v0.13.0.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YARA-X-v0.13.0.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YARA-X-v0.13.0.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YARA-X-v0.13.0.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YARA-X-v0.13.0.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":28265,"url":"https:\/\/kalilinuxtutorials.com\/dotdumper\/","url_meta":{"origin":32514,"position":3},"title":"DotDumper : An Automatic Unpacker &amp; Logger For DotNet Framework","author":"R K","date":"February 7, 2023","format":false,"excerpt":"DotDumper is a automatic unpacker and logger for DotNet Framework targeting files! This tool has been unveiled at Black Hat USA 2022. The automatic detection and classification of any given file in a reliable manner is often considered the holy grail of malware analysis. The trials and tribulations to get\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj2GSXQOSKa94s4kLOR7XTjB1_TIZa3yBu3NYglnXn8W8OosJyWTVYmEGpSkYtwO5HaymaPUKlQ-vh7fTLoMa4e16U4eK-TutUC_y-9xYJcTyD2VEgM0Kd6_-TKVzfw0zfp8uABORAxB-yFQJ7lkoJY3ZFmCmQT6T_yYqWdSDmRLKt2XV_M0JpnUaax\/s728\/DotDumper.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj2GSXQOSKa94s4kLOR7XTjB1_TIZa3yBu3NYglnXn8W8OosJyWTVYmEGpSkYtwO5HaymaPUKlQ-vh7fTLoMa4e16U4eK-TutUC_y-9xYJcTyD2VEgM0Kd6_-TKVzfw0zfp8uABORAxB-yFQJ7lkoJY3ZFmCmQT6T_yYqWdSDmRLKt2XV_M0JpnUaax\/s728\/DotDumper.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj2GSXQOSKa94s4kLOR7XTjB1_TIZa3yBu3NYglnXn8W8OosJyWTVYmEGpSkYtwO5HaymaPUKlQ-vh7fTLoMa4e16U4eK-TutUC_y-9xYJcTyD2VEgM0Kd6_-TKVzfw0zfp8uABORAxB-yFQJ7lkoJY3ZFmCmQT6T_yYqWdSDmRLKt2XV_M0JpnUaax\/s728\/DotDumper.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj2GSXQOSKa94s4kLOR7XTjB1_TIZa3yBu3NYglnXn8W8OosJyWTVYmEGpSkYtwO5HaymaPUKlQ-vh7fTLoMa4e16U4eK-TutUC_y-9xYJcTyD2VEgM0Kd6_-TKVzfw0zfp8uABORAxB-yFQJ7lkoJY3ZFmCmQT6T_yYqWdSDmRLKt2XV_M0JpnUaax\/s728\/DotDumper.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":34945,"url":"https:\/\/kalilinuxtutorials.com\/confuserex2-string-decryptor\/","url_meta":{"origin":32514,"position":4},"title":"ConfuserEx2 String Decryptor &#8211; A Guide To Deobfuscating .NET Applications","author":"Varshini","date":"September 23, 2024","format":false,"excerpt":"ConfuserEx2 is the latest version from the Confuser family \u2192 An open-source, free protector for .NET applications. ConfuserEx2_String_Decryptor deobfuscates constants protection, targeting string objects and char[] arrays. This tool was tested on the vanilla version of ConfuserEx2 (ConfuserEx 1.6.0+-), but it should also handle some customized versions. Description ConfuserEx2_String_Decryptor is\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHaJzOuedX9X9vA0blGpDNYiXLkJASPjfTPNp9iP1YynvGJSBZTLpFUxzEOkqtzIDTNkO0qzJ9jbtVmhjV-UvNKp_Enio1hRCEVKW8naHqd47zVvQaFpBAMugxt1sa_Qc4l1v18mcVLePKd_VNIpcT9DPLysNDivsmEXCbNJUF0nApsnOkM0IEozbDlKcR\/s1600\/ConfuserEx2_String_Decryptor.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHaJzOuedX9X9vA0blGpDNYiXLkJASPjfTPNp9iP1YynvGJSBZTLpFUxzEOkqtzIDTNkO0qzJ9jbtVmhjV-UvNKp_Enio1hRCEVKW8naHqd47zVvQaFpBAMugxt1sa_Qc4l1v18mcVLePKd_VNIpcT9DPLysNDivsmEXCbNJUF0nApsnOkM0IEozbDlKcR\/s1600\/ConfuserEx2_String_Decryptor.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHaJzOuedX9X9vA0blGpDNYiXLkJASPjfTPNp9iP1YynvGJSBZTLpFUxzEOkqtzIDTNkO0qzJ9jbtVmhjV-UvNKp_Enio1hRCEVKW8naHqd47zVvQaFpBAMugxt1sa_Qc4l1v18mcVLePKd_VNIpcT9DPLysNDivsmEXCbNJUF0nApsnOkM0IEozbDlKcR\/s1600\/ConfuserEx2_String_Decryptor.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHaJzOuedX9X9vA0blGpDNYiXLkJASPjfTPNp9iP1YynvGJSBZTLpFUxzEOkqtzIDTNkO0qzJ9jbtVmhjV-UvNKp_Enio1hRCEVKW8naHqd47zVvQaFpBAMugxt1sa_Qc4l1v18mcVLePKd_VNIpcT9DPLysNDivsmEXCbNJUF0nApsnOkM0IEozbDlKcR\/s1600\/ConfuserEx2_String_Decryptor.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHaJzOuedX9X9vA0blGpDNYiXLkJASPjfTPNp9iP1YynvGJSBZTLpFUxzEOkqtzIDTNkO0qzJ9jbtVmhjV-UvNKp_Enio1hRCEVKW8naHqd47zVvQaFpBAMugxt1sa_Qc4l1v18mcVLePKd_VNIpcT9DPLysNDivsmEXCbNJUF0nApsnOkM0IEozbDlKcR\/s1600\/ConfuserEx2_String_Decryptor.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHaJzOuedX9X9vA0blGpDNYiXLkJASPjfTPNp9iP1YynvGJSBZTLpFUxzEOkqtzIDTNkO0qzJ9jbtVmhjV-UvNKp_Enio1hRCEVKW8naHqd47zVvQaFpBAMugxt1sa_Qc4l1v18mcVLePKd_VNIpcT9DPLysNDivsmEXCbNJUF0nApsnOkM0IEozbDlKcR\/s1600\/ConfuserEx2_String_Decryptor.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":23117,"url":"https:\/\/kalilinuxtutorials.com\/php-malware-finder\/","url_meta":{"origin":32514,"position":5},"title":"Php-Malware-Finder : Detect Potentially Malicious PHP Files","author":"R K","date":"March 22, 2022","format":false,"excerpt":"PHP-malware-finder does its very best to detect obfuscated\/dodgy code as well as files using PHP functions often used in malwares\/webshells. The following list of encoders\/obfuscators\/webshells are also detected: BantamBest PHP ObfuscatorCarbylamineCipher DesignCyklodevJoes Web Tools ObfuscatorP.A.SPHP JiamiPhp Obfuscator EncodeSpinObfWeevely3atomikucobra obfuscatornanonovahotphpencodetenncweb-malware-collectionwebtoolsvn Of course it's\u00a0trivial\u00a0to bypass PMF, but its goal is to catch\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjXCuvX3j6RYEyafaB2-l-YNcb7vds2nAfOH5N7zot5TNVmW6dwek9R7EhidHtavfNDLZ3SOG1TFgcuNEpMA6aztaS82APN_9oOD3ubKRBcbbdb8nUoUm_WR6m9i1r1T6-ThJefCzB3qdkc2ac_SC3q7mfDCAQLDJDB-BMU6BJM5yDfcyfkfsXU7Uke=s608","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjXCuvX3j6RYEyafaB2-l-YNcb7vds2nAfOH5N7zot5TNVmW6dwek9R7EhidHtavfNDLZ3SOG1TFgcuNEpMA6aztaS82APN_9oOD3ubKRBcbbdb8nUoUm_WR6m9i1r1T6-ThJefCzB3qdkc2ac_SC3q7mfDCAQLDJDB-BMU6BJM5yDfcyfkfsXU7Uke=s608 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjXCuvX3j6RYEyafaB2-l-YNcb7vds2nAfOH5N7zot5TNVmW6dwek9R7EhidHtavfNDLZ3SOG1TFgcuNEpMA6aztaS82APN_9oOD3ubKRBcbbdb8nUoUm_WR6m9i1r1T6-ThJefCzB3qdkc2ac_SC3q7mfDCAQLDJDB-BMU6BJM5yDfcyfkfsXU7Uke=s608 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=32514"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32514\/revisions"}],"predecessor-version":[{"id":32515,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32514\/revisions\/32515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/32528"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=32514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=32514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=32514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}