Result for 0514B26C64AC40A96BAF5C14D418BC77F467ECB3

Query result

Key Value
FileName./usr/lib/brutesharkcli/System.Reflection.Primitives.dll
FileSize16288
MD5490DA60393E3025B356D2CB241EA5C3B
SHA-10514B26C64AC40A96BAF5C14D418BC77F467ECB3
SHA-256AA071402E8702B3185E9D05C18AF0EC6E34E307154BE4C9B0771D5C179E447B0
SSDEEP192:lWS2ZWqnlUsxrmeWvcuyjS7HnhWgN7aYWh+mqYUHGHtX01k9z3AeoIMDS:lWS2ZW6lBrg7HRN7Nm8QtR9z/oIb
TLSHT10D7229A18BA84203ECD75DB196F6EA837C3C37C62A52596F01D6E5191C67394DF3032A
hashlookup:parent-total1
hashlookup:trust55

Network graph view

Parents (Total: 1)

The searched file hash is included in 1 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize31140212
MD5A16DA707AC54DA0E259B1B21C9E791C4
PackageDescriptionNetwork Forensic Analysis Tool (NFAT) This package contains a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files, but it also capable of directly live capturing from a network interface). It includes: password extracting, building a network map, reconstruct TCP sessions, extract hashes of encrypted passwords and even convert them to a Hashcat format in order to perform an offline Brute Force attack. . The main goal of the project is to provide solution to security researchers and network administrators with the task of network traffic analysis while they try to identify weaknesses that can be used by a potential attacker to gain access to critical points on the network. . On Linux it is a Command Line Interface tool.
PackageMaintainerKali Developers <devel@kali.org>
PackageNamebruteshark
PackageSectioncontrib/utils
PackageVersion1.2.5-0kali7
SHA-17E65E2EBBBE9AD2CEBA4EA8B2C977D14FD300F92
SHA-2566A6A6D28081A594B71E353F4DE467BFB4A40407FB5A4EF01B4EBA1455A8E8E38