pdfalyzer
threat-tools
Our great sponsors
pdfalyzer | threat-tools | |
---|---|---|
8 | 1 | |
211 | 150 | |
- | 6.0% | |
6.9 | 6.5 | |
about 1 hour ago | 5 months ago | |
Python | Python | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pdfalyzer
-
The Pdfalyzer is a tool for visualizing the inner tree structure of a PDF in large and colorful diagrams as well as scanning its internals for suspicious content
The Pdfalyzer is a command line tool (paralyze) as well as a library for working with, visualizing, and scanning the contents of a PDF. Motivation for the project was personal: I got hacked by a PDF that turned out to be hiding its maleficent instructions inside the font binary where it was missed by modern malware scanners (twitter thread) (more details)
-
The Yaralyzer is a new tool for visualizing / force decoding YARA and regular expression matches in binary and text
A few weeks ago I made a post here about a PDF that evaded all malware detection and caused a security breach, almost certainly through PDF instructions hidden inside of an Adobe Type1 Font binary stream embedded within a PDF. At the time I posted a link to a tool I wrote called The Pdfalyzer that diagrams a PDF's internal and scans for various suspect content.
- Any useful cybersecurity software under $5k?
-
Novel PDF malware: injecting JavaScript into the encrypted section of Adobe Type 1 font binaries is not detectable by malware scanners and doesn't interfere with decryption/decompilation of the font (along with a new tool for malicious PDF analysis)
FWIW someone on twitter was talking to me about how he couldn't get t1disasm to work on his m1 Mac - just wanted to throw out there I worked through the issues with compiling the tool from source and there's a script that should work to build them on m1 Macs in the pdfalyzer repo
I dramatically scaled up the binary data scouring and visualization in the pdfalyzer... can rip through every backtick/frontslash/single or double quoted/etc etc set of bytes in the binaries and try a bunch of aggressive approaches to force decode them.
Just posted some new screenshots of various less garbled looking attempts to guess an encoding for some of the stuff in the JS regions of the font binaries (pdfalyzer code is also updated)
threat-tools
-
Any useful cybersecurity software under $5k?
Red Team https://github.com/activecm/threat-tools
What are some alternatives?
peepdf - Powerful Python tool to analyze PDF documents
pypdfium2 - Python bindings to PDFium
Malware-IOCs
Awesome-Red-Teaming - List of Awesome Red Teaming Resources
DidierStevensSuite - Please no pull requests for this repository. Thanks!
CyberPipe - An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.
SysmonForLinux
VanillaWindowsReference - A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare and see what's been added with each update. Use these CSVs to create your own known good hash sets!
awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
anytree - Python tree data library