-
Notifications
You must be signed in to change notification settings - Fork 0
/
model_malware_id_short.go
139 lines (114 loc) · 5.28 KB
/
model_malware_id_short.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
/*
* UnpacMe
*
* # Introduction Welcome to the UNPACME API! All the malware unpacking and file analysis features that you are familiar with on the [unpac.me](https://www.unpac.me/) website are available through our API. You can easily integrate our unpacker into your malware analysis pipeline and begin unpacking at scale! # Authentication The public UNPACME API is publicly available and can be accessed without authentication. In order to use the private UNPACME API you must sign up for an account with UNPACME. Once you have a valid user account you can view your personal API key in your user profile. <SecurityDefinitions /> # Response Structure When interacting with the UNPACME API, if the request was correctly handled, a <b>200</b> HTTP status code will be returned. The body of the response will usually be a JSON object (except for file downloads). ## Response Status Codes Status Code | Description | Notes ------------- | ------------- | - 200 | OK | The request was successful 400 | Bad Request | The request was somehow incorrect. This can be caused by missing arguments or arguments with wrong values. 401 | Unauthorized | The supplied credentials, if any, are not sufficient to access the resource 403 | Forbidden | The account does not have enough privileges to make the request. 404 | Not Found | The requested resource is not found 429 | Too Many Requests | The request frequency has exceeded one of the account quotas (minute, daily or monthly). Monthly quotas are reset on the 1st of the month at 00:00 UTC. 500 | Server Error | The server could not return the representation due to an internal server error ## Error Response If an error has occurred while handling the request an error status code will be returend along with a JSON error message with the following properties. Property | Description ------------- | ------------- Error | The error type Description | A more informative message # Example Clients The following clients can be used to interact with the UNPACME API directly and are provided as examples. These clients are community projects and are not maintained or developed by UNPACME. UNPACME makes no claim as to the safety of these clients, use at your own risk. - [UnpacMe Client](https://github.com/larsborn/UnpacMeClient) (Python) - [UnpacMe Library](https://github.com/R3MRUM/unpacme) (Python) <br>
*
* API version: 1.0.0
*/
// Code generated by OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT.
package openapi
import (
"encoding/json"
)
// MalwareIdShort Malware ID match high level info
type MalwareIdShort struct {
// Match name
Match string `json:"match"`
// Match source
Type string `json:"type"`
}
// NewMalwareIdShort instantiates a new MalwareIdShort object
// This constructor will assign default values to properties that have it defined,
// and makes sure properties required by API are set, but the set of arguments
// will change when the set of required properties is changed
func NewMalwareIdShort(match string, type_ string, ) *MalwareIdShort {
this := MalwareIdShort{}
this.Match = match
this.Type = type_
return &this
}
// NewMalwareIdShortWithDefaults instantiates a new MalwareIdShort object
// This constructor will only assign default values to properties that have it defined,
// but it doesn't guarantee that properties required by API are set
func NewMalwareIdShortWithDefaults() *MalwareIdShort {
this := MalwareIdShort{}
return &this
}
// GetMatch returns the Match field value
func (o *MalwareIdShort) GetMatch() string {
if o == nil {
var ret string
return ret
}
return o.Match
}
// GetMatchOk returns a tuple with the Match field value
// and a boolean to check if the value has been set.
func (o *MalwareIdShort) GetMatchOk() (*string, bool) {
if o == nil {
return nil, false
}
return &o.Match, true
}
// SetMatch sets field value
func (o *MalwareIdShort) SetMatch(v string) {
o.Match = v
}
// GetType returns the Type field value
func (o *MalwareIdShort) GetType() string {
if o == nil {
var ret string
return ret
}
return o.Type
}
// GetTypeOk returns a tuple with the Type field value
// and a boolean to check if the value has been set.
func (o *MalwareIdShort) GetTypeOk() (*string, bool) {
if o == nil {
return nil, false
}
return &o.Type, true
}
// SetType sets field value
func (o *MalwareIdShort) SetType(v string) {
o.Type = v
}
func (o MalwareIdShort) MarshalJSON() ([]byte, error) {
toSerialize := map[string]interface{}{}
if true {
toSerialize["match"] = o.Match
}
if true {
toSerialize["type"] = o.Type
}
return json.Marshal(toSerialize)
}
type NullableMalwareIdShort struct {
value *MalwareIdShort
isSet bool
}
func (v NullableMalwareIdShort) Get() *MalwareIdShort {
return v.value
}
func (v *NullableMalwareIdShort) Set(val *MalwareIdShort) {
v.value = val
v.isSet = true
}
func (v NullableMalwareIdShort) IsSet() bool {
return v.isSet
}
func (v *NullableMalwareIdShort) Unset() {
v.value = nil
v.isSet = false
}
func NewNullableMalwareIdShort(val *MalwareIdShort) *NullableMalwareIdShort {
return &NullableMalwareIdShort{value: val, isSet: true}
}
func (v NullableMalwareIdShort) MarshalJSON() ([]byte, error) {
return json.Marshal(v.value)
}
func (v *NullableMalwareIdShort) UnmarshalJSON(src []byte) error {
v.isSet = true
return json.Unmarshal(src, &v.value)
}