| Crates.io | malwaredb-types |
| lib.rs | malwaredb-types |
| version | 0.1.2 |
| created_at | 2023-08-22 03:26:10.970137+00 |
| updated_at | 2025-08-31 02:46:35.963312+00 |
| description | Data types and parsers for MalwareDB. |
| homepage | https://malwaredb.net/ |
| repository | https://github.com/malwaredb/malwaredb-rs |
| max_upload_size | |
| id | 950691 |
| size | 203,044 |
Note: These parsers are designed to extract potentially useful features from various file types. They are in no way designed to be complete representations of their respective file format. That said, contributions are welcome to extract additional features/information, to add support for a new file format, or to make general improvements!
This crate contains the logic for parsing some executable and document datatypes, and for determining if a Zip file is an MS Office document or an archive of files.
Executable Types:
elf, default)macho, default). Fat Mach-O's embedded Mach-O binaries are extracted and processed as child elements.pe32, default)pef, not default and probably not useful)For each executable, the goal is to extract:
Some complications:
Document Types:
pdf, default)rtf, default)office95, default).docx, .xlsx, etc) currently incomplete (feature flag officexml, default)