Skip to content

Commit

Permalink
Merge pull request #120 from bee-san/update-readme
Browse files Browse the repository at this point in the history
Updated gifs, images and text in the README
  • Loading branch information
bee-san authored Jul 20, 2021
2 parents a197e81 + 4a97d8b commit 44ff715
Show file tree
Hide file tree
Showing 8 changed files with 7 additions and 81 deletions.
12 changes: 7 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,31 +14,33 @@

![](images_for_README/main_demo.gif)

Imagine this: You come across some mysterious text 🧙‍♂️ `5f4dcc3b5aa765d61d8327deb882cf99` and you wonder what it is. What do you do?
Imagine this: You come across some mysterious text 🧙‍♂️ `0x52908400098527886E0F7030069857D2E4169EE7` or `dQw4w9WgXcQ` and you wonder what it is. What do you do?

Well, with `what` all you have to do is ask `what "5f4dcc3b5aa765d61d8327deb882cf99"` and `what` will tell you!
Well, with `what` all you have to do is ask `what "0x52908400098527886E0F7030069857D2E4169EE7"` and `what` will tell you!

`what`'s job is to **identify _what_ something is.** Whether it be a file or text! Or even the hex of a file! What about text _within_ files? We have that too! `what` is recursive, it will identify **everything** in text and more!

# ⚙ Use Cases

## 🦠 Wannacry

![](images_for_README/Screenshot%202021-05-09%20162158.png)
![](images_for_README/wantocry_demo.png)

You come across a new piece of malware called WantToCry. You think back to Wannacry and remember it was stopped because a researcher found a kill-switch in the code.

When a domain, hardcoded into Wannacry, was registered the virus would stop.

You use `What` to identify all the domains in the malware, and use a domain registrar API to register all the domains. If Wannacry happens again, you can stop it in minutes - not weeks.
You use `What` to identify all the domains in the malware, and use a domain registrar API to register all the domains.

## 🦈 Faster Analysis of Pcap files

![](images_for_README/pcap_demo.gif)

Say you have a `.pcap` file from a network attack. `What` can identify this and quickly find you:

- All hashes
- All URLs
- Emails
- Phone numbers
- Credit card numbers
- Cryptocurrency addresses
- Social Security Numbers
Expand Down
Binary file removed images_for_README/Screenshot 2021-05-09 162158.png
Binary file not shown.
21 changes: 0 additions & 21 deletions images_for_README/demo.cast

This file was deleted.

Binary file modified images_for_README/main_demo.gif
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading

0 comments on commit 44ff715

Please sign in to comment.