Commit ae22ba6437ab9d41d6aa45637c848f38b00f16f7
1 parent
cd4b73d9
updated doc for v0.55
Showing
4 changed files
with
69 additions
and
39 deletions
oletools/README.html
| ... | ... | @@ -23,6 +23,25 @@ |
| 23 | 23 | <p>Note: python-oletools is not related to OLETools published by BeCubed Software.</p> |
| 24 | 24 | <h2 id="news">News</h2> |
| 25 | 25 | <ul> |
| 26 | +<li><strong>2019-12-03 v0.55</strong>: | |
| 27 | +<ul> | |
| 28 | +<li>olevba: | |
| 29 | +<ul> | |
| 30 | +<li>added support for SLK files and XLM macro extraction from SLK</li> | |
| 31 | +<li>VBA Stomping detection</li> | |
| 32 | +<li>integrated pcodedmp to extract and disassemble P-code</li> | |
| 33 | +<li>detection of suspicious keywords and IOCs in P-code</li> | |
| 34 | +<li>new option --pcode to display P-code disassembly</li> | |
| 35 | +<li>improved detection of auto execution triggers</li> | |
| 36 | +</ul></li> | |
| 37 | +<li>rtfobj: added URL carver for CVE-2017-0199</li> | |
| 38 | +<li>better handling of unicode for systems with locale that does not support UTF-8, e.g. LANG=C (PR #365)</li> | |
| 39 | +<li>tests: | |
| 40 | +<ul> | |
| 41 | +<li>test files can now be encrypted, to avoid antivirus alerts (PR #217, issue #215)</li> | |
| 42 | +<li>tests that trigger antivirus alerts have been temporarily disabled (issue #215)</li> | |
| 43 | +</ul></li> | |
| 44 | +</ul></li> | |
| 26 | 45 | <li><strong>2019-05-22 v0.54.2</strong>: |
| 27 | 46 | <ul> |
| 28 | 47 | <li>bugfix release: fixed several issues related to encrypted documents and XLM/XLF Excel 4 macros</li> |
| ... | ... | @@ -56,14 +75,6 @@ |
| 56 | 75 | <li>oleid now detects encrypted OpenXML files</li> |
| 57 | 76 | <li>fixed bugs in oleobj, rtfobj, oleid, olevba</li> |
| 58 | 77 | </ul></li> |
| 59 | -<li>2018-02-18 v0.52: | |
| 60 | -<ul> | |
| 61 | -<li>New tool <a href="https://github.com/decalage2/oletools/wiki/msodde">msodde</a> to detect and extract DDE links from MS Office files, RTF and CSV;</li> | |
| 62 | -<li>Fixed bugs in olevba, rtfobj and olefile, to better handle malformed/obfuscated files;</li> | |
| 63 | -<li>Performance improvements in olevba and rtfobj;</li> | |
| 64 | -<li>VBA form parsing in olevba;</li> | |
| 65 | -<li>Office 2007+ support in oleobj.</li> | |
| 66 | -</ul></li> | |
| 67 | 78 | </ul> |
| 68 | 79 | <p>See the <a href="https://github.com/decalage2/oletools/wiki/Changelog">full changelog</a> for more information.</p> |
| 69 | 80 | <h2 id="tools">Tools:</h2> |
| ... | ... | @@ -86,7 +97,7 @@ |
| 86 | 97 | <li><a href="https://github.com/decalage2/oletools/wiki/olemap">olemap</a>: to display a map of all the sectors in an OLE file.</li> |
| 87 | 98 | </ul> |
| 88 | 99 | <h2 id="projects-using-oletools">Projects using oletools:</h2> |
| 89 | -<p>oletools are used by a number of projects and online malware analysis services, including <a href="http://viper.li/">Viper</a>, <a href="https://remnux.org/">REMnux</a>, <a href="https://github.com/fireeye/flare-vm">FLARE-VM</a>, <a href="https://certsocietegenerale.github.io/fame/">FAME</a>, <a href="https://www.hybrid-analysis.com/">Hybrid-analysis.com</a>, <a href="https://www.document-analyzer.net/">Joe Sandbox</a>, <a href="https://sandbox.deepviz.com/">Deepviz</a>, <a href="https://github.com/lmco/laikaboss">Laika BOSS</a>, <a href="https://github.com/cuckoosandbox/cuckoo">Cuckoo Sandbox</a>, <a href="https://sandbox.anlyz.io/">Anlyz.io</a>, <a href="https://github.com/decalage2/ViperMonkey">ViperMonkey</a>, <a href="https://github.com/bontchev/pcodedmp">pcodedmp</a>, <a href="https://dridex.malwareconfig.com">dridex.malwareconfig.com</a>, <a href="https://github.com/countercept/snake">Snake</a>, <a href="https://github.com/cryps1s/DARKSURGEON">DARKSURGEON</a>, <a href="https://github.com/ctxis/CAPE">CAPE</a>, <a href="https://www.cse-cst.gc.ca/en/assemblyline">AssemblyLine</a>, <a href="https://malshare.io">malshare.io</a>, <a href="https://www.adlice.com/download/mrf/">Malware Repository Framework (MRF)</a>, <a href="https://github.com/Tigzy/malware-repo">malware-repo</a>, <a href="https://github.com/MalwareCantFly/Vba2Graph">Vba2Graph</a>, <a href="https://github.com/target/strelka">Strelka</a>, <a href="https://stoq.punchcyber.com/">stoQ</a>, <a href="https://yomi.yoroi.company">YOMI</a>, and probably <a href="https://www.virustotal.com">VirusTotal</a>. And quite a few <a href="https://github.com/search?q=oletools&type=Repositories">other projects on GitHub</a>. (Please <a href="(http://decalage.info/contact)">contact me</a> if you have or know a project using oletools)</p> | |
| 100 | +<p>oletools are used by a number of projects and online malware analysis services, including <a href="https://github.com/IntegralDefense/ACE">ACE</a>, <a href="https://sandbox.anlyz.io/">Anlyz.io</a>, <a href="https://www.cse-cst.gc.ca/en/assemblyline">AssemblyLine</a>, <a href="https://github.com/ctxis/CAPE">CAPE</a>, <a href="https://github.com/cuckoosandbox/cuckoo">Cuckoo Sandbox</a>, <a href="https://github.com/cryps1s/DARKSURGEON">DARKSURGEON</a>, <a href="https://sandbox.deepviz.com/">Deepviz</a>, <a href="https://dridex.malwareconfig.com">dridex.malwareconfig.com</a>, <a href="https://certsocietegenerale.github.io/fame/">FAME</a>, <a href="https://github.com/fireeye/flare-vm">FLARE-VM</a>, <a href="https://www.hybrid-analysis.com/">Hybrid-analysis.com</a>, <a href="https://www.document-analyzer.net/">Joe Sandbox</a>, <a href="https://github.com/lmco/laikaboss">Laika BOSS</a>, <a href="https://github.com/sbidy/MacroMilter">MacroMilter</a>, <a href="https://mailcow.email/">mailcow</a>, <a href="https://malshare.io">malshare.io</a>, <a href="https://github.com/Tigzy/malware-repo">malware-repo</a>, <a href="https://www.adlice.com/download/mrf/">Malware Repository Framework (MRF)</a>, <a href="https://github.com/HeinleinSupport/olefy">olefy</a>, <a href="https://github.com/scVENUS/PeekabooAV">PeekabooAV</a>, <a href="https://github.com/bontchev/pcodedmp">pcodedmp</a>, <a href="https://github.com/CIRCL/PyCIRCLean">PyCIRCLean</a>, <a href="https://remnux.org/">REMnux</a>, <a href="https://github.com/countercept/snake">Snake</a>, <a href="https://app.sndbox.com">SNDBOX</a>, <a href="https://github.com/target/strelka">Strelka</a>, <a href="https://stoq.punchcyber.com/">stoQ</a>, <a href="https://github.com/TheHive-Project/Cortex-Analyzers">TheHive/Cortex</a>, <a href="https://tsurugi-linux.org/">TSUGURI Linux</a>, <a href="https://github.com/MalwareCantFly/Vba2Graph">Vba2Graph</a>, <a href="http://viper.li/">Viper</a>, <a href="https://github.com/decalage2/ViperMonkey">ViperMonkey</a>, <a href="https://yomi.yoroi.company">YOMI</a>, and probably <a href="https://www.virustotal.com">VirusTotal</a>. And quite a few <a href="https://github.com/search?q=oletools&type=Repositories">other projects on GitHub</a>. (Please <a href="(http://decalage.info/contact)">contact me</a> if you have or know a project using oletools)</p> | |
| 90 | 101 | <h2 id="download-and-install">Download and Install:</h2> |
| 91 | 102 | <p>The recommended way to download and install/update the <strong>latest stable release</strong> of oletools is to use <a href="https://pip.pypa.io/en/stable/installing/">pip</a>:</p> |
| 92 | 103 | <ul> | ... | ... |
oletools/README.rst
| ... | ... | @@ -29,6 +29,27 @@ Software. |
| 29 | 29 | News |
| 30 | 30 | ---- |
| 31 | 31 | |
| 32 | +- **2019-12-03 v0.55**: | |
| 33 | + | |
| 34 | + - olevba: | |
| 35 | + | |
| 36 | + - added support for SLK files and XLM macro extraction from SLK | |
| 37 | + - VBA Stomping detection | |
| 38 | + - integrated pcodedmp to extract and disassemble P-code | |
| 39 | + - detection of suspicious keywords and IOCs in P-code | |
| 40 | + - new option --pcode to display P-code disassembly | |
| 41 | + - improved detection of auto execution triggers | |
| 42 | + | |
| 43 | + - rtfobj: added URL carver for CVE-2017-0199 | |
| 44 | + - better handling of unicode for systems with locale that does not | |
| 45 | + support UTF-8, e.g. LANG=C (PR #365) | |
| 46 | + - tests: | |
| 47 | + | |
| 48 | + - test files can now be encrypted, to avoid antivirus alerts (PR | |
| 49 | + #217, issue #215) | |
| 50 | + - tests that trigger antivirus alerts have been temporarily | |
| 51 | + disabled (issue #215) | |
| 52 | + | |
| 32 | 53 | - **2019-05-22 v0.54.2**: |
| 33 | 54 | |
| 34 | 55 | - bugfix release: fixed several issues related to encrypted |
| ... | ... | @@ -79,17 +100,6 @@ News |
| 79 | 100 | - oleid now detects encrypted OpenXML files |
| 80 | 101 | - fixed bugs in oleobj, rtfobj, oleid, olevba |
| 81 | 102 | |
| 82 | -- 2018-02-18 v0.52: | |
| 83 | - | |
| 84 | - - New tool | |
| 85 | - `msodde <https://github.com/decalage2/oletools/wiki/msodde>`__ to | |
| 86 | - detect and extract DDE links from MS Office files, RTF and CSV; | |
| 87 | - - Fixed bugs in olevba, rtfobj and olefile, to better handle | |
| 88 | - malformed/obfuscated files; | |
| 89 | - - Performance improvements in olevba and rtfobj; | |
| 90 | - - VBA form parsing in olevba; | |
| 91 | - - Office 2007+ support in oleobj. | |
| 92 | - | |
| 93 | 103 | See the `full |
| 94 | 104 | changelog <https://github.com/decalage2/oletools/wiki/Changelog>`__ for |
| 95 | 105 | more information. |
| ... | ... | @@ -141,29 +151,38 @@ Projects using oletools: |
| 141 | 151 | ------------------------ |
| 142 | 152 | |
| 143 | 153 | oletools are used by a number of projects and online malware analysis |
| 144 | -services, including `Viper <http://viper.li/>`__, | |
| 145 | -`REMnux <https://remnux.org/>`__, | |
| 146 | -`FLARE-VM <https://github.com/fireeye/flare-vm>`__, | |
| 154 | +services, including `ACE <https://github.com/IntegralDefense/ACE>`__, | |
| 155 | +`Anlyz.io <https://sandbox.anlyz.io/>`__, | |
| 156 | +`AssemblyLine <https://www.cse-cst.gc.ca/en/assemblyline>`__, | |
| 157 | +`CAPE <https://github.com/ctxis/CAPE>`__, `Cuckoo | |
| 158 | +Sandbox <https://github.com/cuckoosandbox/cuckoo>`__, | |
| 159 | +`DARKSURGEON <https://github.com/cryps1s/DARKSURGEON>`__, | |
| 160 | +`Deepviz <https://sandbox.deepviz.com/>`__, | |
| 161 | +`dridex.malwareconfig.com <https://dridex.malwareconfig.com>`__, | |
| 147 | 162 | `FAME <https://certsocietegenerale.github.io/fame/>`__, |
| 163 | +`FLARE-VM <https://github.com/fireeye/flare-vm>`__, | |
| 148 | 164 | `Hybrid-analysis.com <https://www.hybrid-analysis.com/>`__, `Joe |
| 149 | -Sandbox <https://www.document-analyzer.net/>`__, | |
| 150 | -`Deepviz <https://sandbox.deepviz.com/>`__, `Laika | |
| 151 | -BOSS <https://github.com/lmco/laikaboss>`__, `Cuckoo | |
| 152 | -Sandbox <https://github.com/cuckoosandbox/cuckoo>`__, | |
| 153 | -`Anlyz.io <https://sandbox.anlyz.io/>`__, | |
| 154 | -`ViperMonkey <https://github.com/decalage2/ViperMonkey>`__, | |
| 165 | +Sandbox <https://www.document-analyzer.net/>`__, `Laika | |
| 166 | +BOSS <https://github.com/lmco/laikaboss>`__, | |
| 167 | +`MacroMilter <https://github.com/sbidy/MacroMilter>`__, | |
| 168 | +`mailcow <https://mailcow.email/>`__, | |
| 169 | +`malshare.io <https://malshare.io>`__, | |
| 170 | +`malware-repo <https://github.com/Tigzy/malware-repo>`__, `Malware | |
| 171 | +Repository Framework (MRF) <https://www.adlice.com/download/mrf/>`__, | |
| 172 | +`olefy <https://github.com/HeinleinSupport/olefy>`__, | |
| 173 | +`PeekabooAV <https://github.com/scVENUS/PeekabooAV>`__, | |
| 155 | 174 | `pcodedmp <https://github.com/bontchev/pcodedmp>`__, |
| 156 | -`dridex.malwareconfig.com <https://dridex.malwareconfig.com>`__, | |
| 175 | +`PyCIRCLean <https://github.com/CIRCL/PyCIRCLean>`__, | |
| 176 | +`REMnux <https://remnux.org/>`__, | |
| 157 | 177 | `Snake <https://github.com/countercept/snake>`__, |
| 158 | -`DARKSURGEON <https://github.com/cryps1s/DARKSURGEON>`__, | |
| 159 | -`CAPE <https://github.com/ctxis/CAPE>`__, | |
| 160 | -`AssemblyLine <https://www.cse-cst.gc.ca/en/assemblyline>`__, | |
| 161 | -`malshare.io <https://malshare.io>`__, `Malware Repository Framework | |
| 162 | -(MRF) <https://www.adlice.com/download/mrf/>`__, | |
| 163 | -`malware-repo <https://github.com/Tigzy/malware-repo>`__, | |
| 164 | -`Vba2Graph <https://github.com/MalwareCantFly/Vba2Graph>`__, | |
| 178 | +`SNDBOX <https://app.sndbox.com>`__, | |
| 165 | 179 | `Strelka <https://github.com/target/strelka>`__, |
| 166 | 180 | `stoQ <https://stoq.punchcyber.com/>`__, |
| 181 | +`TheHive/Cortex <https://github.com/TheHive-Project/Cortex-Analyzers>`__, | |
| 182 | +`TSUGURI Linux <https://tsurugi-linux.org/>`__, | |
| 183 | +`Vba2Graph <https://github.com/MalwareCantFly/Vba2Graph>`__, | |
| 184 | +`Viper <http://viper.li/>`__, | |
| 185 | +`ViperMonkey <https://github.com/decalage2/ViperMonkey>`__, | |
| 167 | 186 | `YOMI <https://yomi.yoroi.company>`__, and probably |
| 168 | 187 | `VirusTotal <https://www.virustotal.com>`__. And quite a few `other |
| 169 | 188 | projects on | ... | ... |
oletools/doc/Home.html
| ... | ... | @@ -16,7 +16,7 @@ |
| 16 | 16 | <![endif]--> |
| 17 | 17 | </head> |
| 18 | 18 | <body> |
| 19 | -<h1 id="python-oletools-v0.54-documentation">python-oletools v0.54 documentation</h1> | |
| 19 | +<h1 id="python-oletools-v0.55-documentation">python-oletools v0.55 documentation</h1> | |
| 20 | 20 | <p>This is the home page of the documentation for python-oletools. The latest version can be found <a href="https://github.com/decalage2/oletools/wiki">online</a>, otherwise a copy is provided in the doc subfolder of the package.</p> |
| 21 | 21 | <p><a href="http://www.decalage.info/python/oletools">python-oletools</a> is a package of python tools to analyze <a href="http://en.wikipedia.org/wiki/Compound_File_Binary_Format">Microsoft OLE2 files</a> (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging. It is based on the <a href="http://www.decalage.info/olefile">olefile</a> parser. See <a href="http://www.decalage.info/python/oletools" class="uri">http://www.decalage.info/python/oletools</a> for more info.</p> |
| 22 | 22 | <p><strong>Quick links:</strong> <a href="http://www.decalage.info/python/oletools">Home page</a> - <a href="https://github.com/decalage2/oletools/wiki/Install">Download/Install</a> - <a href="https://github.com/decalage2/oletools/wiki">Documentation</a> - <a href="https://github.com/decalage2/oletools/issues">Report Issues/Suggestions/Questions</a> - <a href="http://decalage.info/contact">Contact the Author</a> - <a href="https://github.com/decalage2/oletools">Repository</a> - <a href="https://twitter.com/decalage2">Updates on Twitter</a></p> | ... | ... |