mirror of
https://github.com/ytisf/theZoo.git
synced 2025-12-05 20:19:57 -08:00
dbVer --> 1750498935000
Some fresh wipers
This commit is contained in:
@@ -1 +1 @@
|
||||
1712294860000
|
||||
1750498935000
|
||||
BIN
conf/maldb.db
BIN
conf/maldb.db
Binary file not shown.
@@ -1,3 +1,4 @@
|
||||
python
|
||||
import sqlite3 as lite
|
||||
from imports import globals
|
||||
import sys
|
||||
@@ -6,59 +7,61 @@ import sys
|
||||
class DBHandler:
|
||||
|
||||
def __init__(self):
|
||||
self._connect()
|
||||
|
||||
def _connect(self):
|
||||
try:
|
||||
self.con = lite.connect(globals.vars.db_path)
|
||||
self.cur = self.con.cursor()
|
||||
except lite.Error as e:
|
||||
print("An error occurred:", e.args[0])
|
||||
print(f"An error occurred: {e.args[0]}")
|
||||
sys.exit()
|
||||
|
||||
def get_full_details(self):
|
||||
return self.cur.execute("SELECT * FROM Malwares").fetchall()
|
||||
|
||||
def get_partial_details(self):
|
||||
return self.cur.execute("SELECT ID, TYPE, LANGUAGE, ARCHITECTURE, PLATFORM, NAME FROM Malwares").fetchall()
|
||||
query = "SELECT ID, TYPE, LANGUAGE, ARCHITECTURE, PLATFORM, NAME FROM Malwares"
|
||||
return self.cur.execute(query).fetchall()
|
||||
|
||||
def get_mal_list(self):
|
||||
return self.cur.execute("SELECT ID, NAME, TYPE From Malwares").fetchall()
|
||||
query = "SELECT ID, NAME, TYPE FROM Malwares"
|
||||
return self.cur.execute(query).fetchall()
|
||||
|
||||
def get_mal_names(self):
|
||||
|
||||
# Sqlite3 returns a tuple even if a single value is returned
|
||||
# We use x[0] for x to unpack the tuples
|
||||
return [val[0] for val in self.cur.execute("SELECT NAME FROM Malwares").fetchall()]
|
||||
query = "SELECT NAME FROM Malwares"
|
||||
return [val[0] for val in self.cur.execute(query).fetchall()]
|
||||
|
||||
def get_mal_tags(self):
|
||||
return [val[0] for val in self.cur.execute("SELECT DISTINCT TAGS From Malwares WHERE TAGS IS NOT NULL").fetchall()]
|
||||
query = "SELECT DISTINCT TAGS FROM Malwares WHERE TAGS IS NOT NULL"
|
||||
return [val[0] for val in self.cur.execute(query).fetchall()]
|
||||
|
||||
def get_mal_info(self, mid):
|
||||
return self.cur.execute("SELECT TYPE, NAME, VERSION, AUTHOR, LANGUAGE, DATE, ARCHITECTURE, PLATFORM, TAGS From Malwares WHERE ID =" + str(mid)).fetchall()
|
||||
query = (
|
||||
"SELECT TYPE, NAME, VERSION, AUTHOR, LANGUAGE, DATE, ARCHITECTURE, PLATFORM, TAGS "
|
||||
f"FROM Malwares WHERE ID = {mid}"
|
||||
)
|
||||
return self.cur.execute(query).fetchall()
|
||||
|
||||
def query(self, query, param=''):
|
||||
if globals.vars.DEBUG_LEVEL is 2:
|
||||
if globals.vars.DEBUG_LEVEL == 2:
|
||||
print(locals())
|
||||
try:
|
||||
if param is not '':
|
||||
return self.cur.execute(query, param if type(param) is list else [param]).fetchall()
|
||||
else:
|
||||
if param != '':
|
||||
params = param if isinstance(param, list) else [param]
|
||||
return self.cur.execute(query, params).fetchall()
|
||||
return self.cur.execute(query).fetchall()
|
||||
except lite.Error as e:
|
||||
print("An error occurred:", e.args[0])
|
||||
print(f"An error occurred: {e.args[0]}")
|
||||
sys.exit()
|
||||
|
||||
def close_connection(self):
|
||||
try:
|
||||
self.cur.close()
|
||||
self.con.close()
|
||||
return
|
||||
except lite.Error as e:
|
||||
print("An error occurred:", e.args[0])
|
||||
print(f"An error occurred: {e.args[0]}")
|
||||
sys.exit()
|
||||
|
||||
def renew_connection(self):
|
||||
try:
|
||||
self.con = lite.connect(globals.vars.db_path)
|
||||
self.cur = self.con.cursor()
|
||||
except lite.Error as e:
|
||||
print("An error occurred:", e.args[0])
|
||||
sys.exit()
|
||||
self._connect()
|
||||
1
malware/Binaries/Wiper.BEEP.E/Wiper.BEEP.E.md5
Normal file
1
malware/Binaries/Wiper.BEEP.E/Wiper.BEEP.E.md5
Normal file
@@ -0,0 +1 @@
|
||||
eb69bd536036b275631b0cdcac3c0963
|
||||
1
malware/Binaries/Wiper.BEEP.E/Wiper.BEEP.E.pass
Normal file
1
malware/Binaries/Wiper.BEEP.E/Wiper.BEEP.E.pass
Normal file
@@ -0,0 +1 @@
|
||||
infected
|
||||
BIN
malware/Binaries/Wiper.BEEP.E/Wiper.BEEP.E.zip
Normal file
BIN
malware/Binaries/Wiper.BEEP.E/Wiper.BEEP.E.zip
Normal file
Binary file not shown.
1
malware/Binaries/Wiper.SAPP.IC/Wiper.SAPP.IC.md5
Normal file
1
malware/Binaries/Wiper.SAPP.IC/Wiper.SAPP.IC.md5
Normal file
@@ -0,0 +1 @@
|
||||
ae4d661f2bd87e2ff78dedc34e04424e
|
||||
1
malware/Binaries/Wiper.SAPP.IC/Wiper.SAPP.IC.pass
Normal file
1
malware/Binaries/Wiper.SAPP.IC/Wiper.SAPP.IC.pass
Normal file
@@ -0,0 +1 @@
|
||||
infected
|
||||
BIN
malware/Binaries/Wiper.SAPP.IC/Wiper.SAPP.IC.zip
Normal file
BIN
malware/Binaries/Wiper.SAPP.IC/Wiper.SAPP.IC.zip
Normal file
Binary file not shown.
1
malware/Binaries/Wiper.WIPE32.P/Wiper.WIPE32.P.md5
Normal file
1
malware/Binaries/Wiper.WIPE32.P/Wiper.WIPE32.P.md5
Normal file
@@ -0,0 +1 @@
|
||||
e44327fbec4508158f0f9a119c1b7430
|
||||
1
malware/Binaries/Wiper.WIPE32.P/Wiper.WIPE32.P.pass
Normal file
1
malware/Binaries/Wiper.WIPE32.P/Wiper.WIPE32.P.pass
Normal file
@@ -0,0 +1 @@
|
||||
infected
|
||||
BIN
malware/Binaries/Wiper.WIPE32.P/Wiper.WIPE32.P.zip
Normal file
BIN
malware/Binaries/Wiper.WIPE32.P/Wiper.WIPE32.P.zip
Normal file
Binary file not shown.
Reference in New Issue
Block a user