zlacker

[parent] [thread] 3 comments
1. neodym+(OP)[view] [source] 2022-07-10 00:38:49
If I'm doing real malware execution and analysis, I would one- way transfer the relevant file(s) to my sandbox and disable any backward connectivity before execution, but I still need a reasonably simple way of getting files to (suspicious files, etc) and from (resulting logs, registry changes, pcap, etc) the malware sandbox. Ive kinda solved this already using a number of tools outside my work host, but just in the off situations where this is necessary I want to have a template VM prepped in advance.
replies(1): >>s_ting+w1
2. s_ting+w1[view] [source] 2022-07-10 00:57:51
>>neodym+(OP)
https://wormhole.app/
replies(1): >>bzmrgo+8y
◧◩
3. bzmrgo+8y[view] [source] [discussion] 2022-07-10 08:37:55
>>s_ting+w1
I second this, it's called magic wormhole, if you want the source, croc is a more friendly solution built ontop of magic wormhole. In any event, quick and easy.
replies(1): >>0xCMP+DYf
◧◩◪
4. 0xCMP+DYf[view] [source] [discussion] 2022-07-14 22:29:17
>>bzmrgo+8y
PSA: wormhole.app and magic wormhole are not the same

If you want to use the well known magic wormhole then visit the repo for instructions: https://github.com/magic-wormhole/magic-wormhole

The current supported version is a python cli app. A rust version is being developed, but last I checked was not considered ready.

[go to top]