Is your feature request related to a problem? Please describe.
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
Well, I am starting to get into reverse engineering. I am not well versed in x86 assembly. But on the other hand I am able to reverse .Net binary's as well as other languages.
So it would be very awesome to have a little tag on every malpedia page related to a specific malware that show's the languages it was written in or compiled in.
Describe the solution you'd like
A clear and concise description of what you want to happen.
Is your feature request related to a problem? Please describe. A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
Well, I am starting to get into reverse engineering. I am not well versed in x86 assembly. But on the other hand I am able to reverse .Net binary's as well as other languages. So it would be very awesome to have a little tag on every malpedia page related to a specific malware that show's the languages it was written in or compiled in.
Describe the solution you'd like A clear and concise description of what you want to happen.
Example: Add a Tag [ .Net ] to the page: https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer So one would instantly see that it is a .Net malware. This should be possible for many malware types, as you can often find articles which state the language. E.g.: https://blogs.blackberry.com/en/2021/07/threat-thursday-redline-infostealer where it states: RedLine samples tend to be heavily obfuscated .NET compiled executables.
Describe alternatives you've considered A clear and concise description of any alternative solutions or features you've considered.
As this is a pretty specific request I don't know if there is any.
Additional context Add any other context or screenshots about the feature request here.
Maybe such tag could look like the once in MISP: https://www.misp-project.org/assets/images/misp/blog/local-tags.png