Crates.io | malwaredb-types |
lib.rs | malwaredb-types |
version | 0.0.15 |
source | src |
created_at | 2023-08-22 03:26:10.970137 |
updated_at | 2024-10-31 23:19:53.983105 |
description | Data types and parsers for MalwareDB. |
homepage | https://malwaredb.net/ |
repository | https://github.com/malwaredb/malwaredb-rs |
max_upload_size | |
id | 950691 |
size | 197,704 |
Note: These parsers are designed to extract potentially useful features from various file types. They are in no way designed to be complete representations of their respective file format. That said, contributions are welcome to extract additional features/information, to add support for a new file format, or to make general improvements!
This crate contains the logic for parsing some executable and document datatypes, and for determining if a Zip file is an MS Office document or an archive of files.
Executable Types:
elf
, default)macho
, default). Fat Mach-O's embedded Mach-O binaries are extracted and processed as child elements.pe32
, default)pef
, not default and probably not useful)For each executable, the goal is to extract:
Some complications:
Document Types:
pdf
, default)rtf
, default)There should be a simple way to represent the needed data so the component which stores the data in the database doesn't have to be aware of file formats.