-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rust/Python versions signature detection parity #778
Comments
The first two signatures ( The XZ compressed data at offset 0x444C reported by Binwalkv2 is a false postive, even though it seems to extract successfully. Looking at a hex dump of the If you take all the data from offset 0x444C to the end of the
Binwalkv3 correctly recognizes that the XZ signature at offset 0x444C is not valid, and does not report it. |
Thanks for the explanation! I'll wait for the new Android and Linux signatures. |
Binwalk 2.3.3, Python:
Binwalk 3.1.0, Rust:
boot.zip
The text was updated successfully, but these errors were encountered: