Metadata-Version: 2.1
Name: magic-identify
Version: 0.2.2
Summary: A python module and command to try really hard to get a mime-type for a file
Home-page: https://github.com/hardaker/magic-identify
Author: Wes Hardaker
Author-email: opensource@hardakers.net
License: UNKNOWN
Platform: UNKNOWN
Classifier: Programming Language :: Python :: 3
Classifier: Operating System :: OS Independent
Requires-Python: >=3.6
Description-Content-Type: text/markdown
License-File: LICENSE

# About

magic-identify implements a wrapper around both the python-magic
module and the identify module to try and always return results, even
if one fails.  Finally, failing that it will try to guess some minimal
shell script environments too (specifically looking at common keywords
in malware droppers/downloaders that do not always have leading
identification lines).

It returns two strings, one which may be a higher level text
description and a second which should always be a mime-type
identifier.

# Example module use:

    import magicidentify
    c = magicidentify.MagicIdentify()
    print(c.identify("/bin/ls"))
    # ('application/x-pie-executable', 'application/x-pie-executable')
    
# Example CLI use:

    # magic-identify /bin/ls /sbin/ifup
    /bin/ls: application/x-pie-executable, application/x-pie-executable
      using magic:    application/x-pie-executable, application/x-pie-executable
      using identify: unknown, unknown
      using hack:     unknown, unknown
    /sbin/ifup: inode/symlink, inode/symlink
      using magic:    inode/symlink, inode/symlink
      using identify: bash/shell, text/x-bash
      using hack:     unknown, unknown

    # magic-identify -q /bin/ls /sbin/ifup
    application/x-pie-executable
    inode/symlink

# Todo

- Handle more boring cases from some outputs (text/inode)

# Acknowledgements

The following wonderful github accounts have contributed to the code base:

- @JakeRoggenbuck


