blob: e4440187e10ff9826ff4ccc3dfb5511f3c3ef47a (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
|
#!/bin/bash
source ~/.colors
~/.tools/ratmenu -label "malware" \
-style dreary -fg "$COLOR11" -bg "$COLOR0" \
"androapkinfo" "urxvt -e bash -c 'androapkinfo && zsh'" \
"androaxml" "urxvt -e bash -c 'androaxml && zsh'" \
"androcsign" "urxvt -e bash -c 'androcsign && zsh'" \
"androdd" "urxvt -e bash -c 'androdd && zsh'" \
"androdiff" "urxvt -e bash -c 'androdiff && zsh'" \
"androgexf" "urxvt -e bash -c 'androgexf && zsh'" \
"androlyze" "urxvt -e bash -c 'androlyze && zsh'" \
"andromercury" "urxvt -e bash -c 'andromercury && zsh'" \
"androrisk" "urxvt -e bash -c 'androrisk && zsh'" \
"androsign" "urxvt -e bash -c 'androsign && zsh'" \
"androsim" "urxvt -e bash -c 'androsim && zsh'" \
"androxgmml" "urxvt -e bash -c 'androxgmml && zsh'" \
"apkviewer" "urxvt -e bash -c 'apkviewer -h && zsh'" \
"balbuzard" "urxvt -e bash -c 'balbuzard && zsh'" \
"bbcrack" "urxvt -e bash -c 'bbcrack && zsh'" \
"bbharvest" "urxvt -e bash -c 'bbharvest && zsh'" \
"bbtrans" "urxvt -e bash -c 'bbtrans && zsh'" \
"bamfbrute" "urxvt -e bash -c 'bamfbrute -h && zsh'" \
"bamfdetect" "urxvt -e bash -c 'bamfdetect -h && zsh'" \
"bdlogparser" "urxvt -e bash -c 'bdlogparser && zsh'" \
"captipper" "urxvt -e bash -c 'captipper && zsh'" \
"clamscanlogparser" "urxvt -e bash -c 'clamscanlogparser && zsh'" \
"cuckoo" "urxvt -e bash -c 'cuckoo && zsh'" \
"damm" "urxvt -e bash -c 'damm -h && zsh'" \
"depdep" "urxvt -e bash -c 'depdep -h && zsh'" \
"fprotlogparser" "urxvt -e bash -c 'fprotlogparser && zsh'" \
"malheur" "urxvt -e bash -c 'malheur -h && zsh'" \
"malmon" "urxvt -e bash -c 'malmon -h && zsh'" \
"malmon-scan" "urxvt -e bash -c 'malmon-scan && zsh'" \
"maltrieve" "urxvt -e bash -c 'maltrieve -h && zsh'" \
"maltrievecategorizer" "urxvt -e bash -c 'maltrievecategorizer && zsh'" \
"malware-check" "urxvt -e bash -c 'malware-check && zsh'" \
"malwaredetect" "urxvt -e bash -c 'malwaredetect && zsh'" \
"pdf2graph" "urxvt -e bash -c 'pdf2graph && zsh'" \
"pdf2pdfa" "urxvt -e bash -c 'pdf2pdfa && zsh'" \
"pdf2ruby" "urxvt -e bash -c 'pdf2ruby && zsh'" \
"pdfcocoon" "urxvt -e bash -c 'pdfcocoon && zsh'" \
"pdfcop" "urxvt -e bash -c 'pdfcop && zsh'" \
"pdfdecompress" "urxvt -e bash -c 'pdfdecompress && zsh'" \
"pdfdecrypt" "urxvt -e bash -c 'pdfdecrypt && zsh'" \
"pdfencrypt" "urxvt -e bash -c 'pdfencrypt && zsh'" \
"pdfexplode" "urxvt -e bash -c 'pdfexplode && zsh'" \
"pdfextract" "urxvt -e bash -c 'pdfextract && zsh'" \
"pdfmetadata" "urxvt -e bash -c 'pdfmetadata && zsh'" \
"pdfsh" "urxvt -e bash -c 'pdfsh && zsh'" \
"pdfwalker" "urxvt -e bash -c 'pdfwalker && zsh'" \
"pdf2graph" "urxvt -e bash -c 'pdf2graph && zsh'" \
"pdf2pdfa" "urxvt -e bash -c 'pdf2pdfa && zsh'" \
"pdf2ruby" "urxvt -e bash -c 'pdf2ruby && zsh'" \
"pdfcocoon" "urxvt -e bash -c 'pdfcocoon && zsh'" \
"pdfcop" "urxvt -e bash -c 'pdfcop && zsh'" \
"pdfdecompress" "urxvt -e bash -c 'pdfdecompress && zsh'" \
"pdfdecrypt" "urxvt -e bash -c 'pdfdecrypt && zsh'" \
"pdfencrypt" "urxvt -e bash -c 'pdfencrypt && zsh'" \
"pdfexplode" "urxvt -e bash -c 'pdfexplode && zsh'" \
"pdfextract" "urxvt -e bash -c 'pdfextract && zsh'" \
"pdfmetadata" "urxvt -e bash -c 'pdfmetadata && zsh'" \
"pdfsh" "urxvt -e bash -c 'pdfsh && zsh'" \
"pdfwalker" "urxvt -e bash -c 'pdfwalker && zsh'" \
"peepdf" "urxvt -e bash -c 'peepdf -h && zsh'" \
"peframe" "urxvt -e bash -c 'peframe && zsh'" \
"pyew" "urxvt -e bash -c 'pyew -h && zsh'" \
"viper" "urxvt -e bash -c 'viper -h && zsh'" \
"yara" "urxvt -e bash -c 'yara -h && zsh'" \
"yarac" "urxvt -e bash -c 'yarac && zsh'" \
"dump_process.py" "urxvt -e bash -c 'dump_process.py && zsh'" \
"malware_launcher.sh" "urxvt -e bash -c 'malware_launcher.sh && zsh'" \
"start_zerowine.sh" "urxvt -e bash -c 'start_zerowine.sh && zsh'" \
|