pdfalyzer
CyberChef
Our great sponsors
pdfalyzer | CyberChef | |
---|---|---|
8 | 286 | |
216 | 25,384 | |
- | 3.8% | |
6.9 | 8.8 | |
13 days ago | 5 days ago | |
Python | JavaScript | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pdfalyzer
-
Are there any PDF specific YARA rules you know of that are not collected in The Pdfalyzer repo yet?
Direct link to the folder with 3 .yara files compiling a bunch of YARA rule sources. Looking for anything not represented here, or even ideas for such.
-
The Pdfalyzer is a tool for visualizing the inner tree structure of a PDF in large and colorful diagrams as well as scanning its internals for suspicious content
The Pdfalyzer is a command line tool (paralyze) as well as a library for working with, visualizing, and scanning the contents of a PDF. Motivation for the project was personal: I got hacked by a PDF that turned out to be hiding its maleficent instructions inside the font binary where it was missed by modern malware scanners (twitter thread) (more details)
-
The Yaralyzer is a new tool for visualizing / force decoding YARA and regular expression matches in binary and text
A few weeks ago I made a post here about a PDF that evaded all malware detection and caused a security breach, almost certainly through PDF instructions hidden inside of an Adobe Type1 Font binary stream embedded within a PDF. At the time I posted a link to a tool I wrote called The Pdfalyzer that diagrams a PDF's internal and scans for various suspect content.
- Any useful cybersecurity software under $5k?
-
Novel PDF malware: injecting JavaScript into the encrypted section of Adobe Type 1 font binaries is not detectable by malware scanners and doesn't interfere with decryption/decompilation of the font (along with a new tool for malicious PDF analysis)
I dramatically scaled up the binary data scouring and visualization in the pdfalyzer... can rip through every backtick/frontslash/single or double quoted/etc etc set of bytes in the binaries and try a bunch of aggressive approaches to force decode them.
-
Novel (?) PDF attack (and a new PDF visualization/threat assessment tool): injecting JavaScript into the encrypted section of Adobe Type 1 font binaries is not detectable by malware scanners (nor does it interfere with the decryption of the font)
The tool is the the pdfalyzer; I just open sourced it. Meant to fill in some gaps around pdf-parser.py and the rest of Didier Stevens's malicious PDF toolkit. Makes pretty charts, previews binary data, and (most importantly) digs through PDF font binaries for potentially executable stuff. Example output can be seen at the GitHub link.
CyberChef
-
PicoCTF 2024: packer
Then we take the encrypted text and use CyberChef to decrypt it.
-
Unbreakable 2024: secrets-of-winter
Let's go to CyberChef and insert our pieces of evidence.
-
YouTube: Google has found a way to break Invidious
A parameter was changed from '2AMBCgIQBg' to 'CgIIAdgDAQ%3D%3D' which is just the correct base64 encoding they should have been using the entire time.
I don't think this was a hostile action by Google, I think someone just added better input validation for security reasons and it accidently broke the bad requests they were sending.
https://gchq.github.io/CyberChef/#recipe=URL_Decode()From_Ba...
-
PicoCTF 2024- CanYouSee
❗This is indeed the flag, but the text is encrypted with Base64. Usually, the presence of padding character "=" indicates that's Base64 type of encoding (but that's only one of the hints). To decrypt it, we can use CyberChef. Copy-paste the text and we either:
-
CyberChef VS DevToolboxWeb - a user suggested alternative
2 projects | 6 Feb 2024
-
CyberChef from GCHQ: The Cyber Swiss Army Knife
It uses a combination of magic bytes (like the `file` command), entropy analysis and character frequency detection to determine whether an output is likely to be of interest to the user.
The file type mechanism is written here[0]. There's a list of all signatures we detect here[1].
[0] https://github.com/gchq/CyberChef/blob/master/src/core/lib/F...
- Show HN: File Hider
- UK GCHQ's CyberChef
-
Lets try this again. Got a code for you to break.
I think this can be deciphered using CyberChef...
- CyberChef is a useful tool for decoding information.
What are some alternatives?
peepdf - Powerful Python tool to analyze PDF documents
QR-Code-generator - High-quality QR Code generator library in Java, TypeScript/JavaScript, Python, Rust, C++, C.
pypdfium2 - Python bindings to PDFium
CapRover - Scalable PaaS (automated Docker+nginx) - aka Heroku on Steroids
Malware-IOCs
py4e - Web site for www.py4e.com and source to the Python 3.0 textbook
DidierStevensSuite - Please no pull requests for this repository. Thanks!
cyberchef-recipes - A list of cyber-chef recipes and curated links
SysmonForLinux
Ciphey - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
CyberPipe - An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.
Monica - Personal CRM. Remember everything about your friends, family and business relationships.