{"id":4536,"date":"2017-05-26T19:46:20","date_gmt":"2017-05-26T11:46:20","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4536"},"modified":"2017-05-26T19:46:31","modified_gmt":"2017-05-26T11:46:31","slug":"sheep-wolf-exploit-md5-collisions-for-malware-detection","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2017\/05\/sheep-wolf-exploit-md5-collisions-for-malware-detection\/","title":{"rendered":"sheep-wolf – Exploit MD5 Collisions For Malware Detection"},"content":{"rendered":"

sheep-wolf is a tool to help you Exploit MD5 Collisions in software, specially malware samples which are commonly detected using MD5 hash signatures.<\/p>\n

\"sheep-wolfand then a malicious one (Wolf) that have the same MD5 hash. Please use this code to test if the security products in your reach use MD5 internally to fingerprint binaries and share your results by issuing a pull request updating the contents of results\/<\/code>!<\/p>\n

Dependencies<\/h3>\n