Commit e72b85c7fd694d0b85d47220b394739def822556

Authored by decalage2
2 parents 1c52c0d5 4d474c3a

Merge remote-tracking branch 'origin/master'

oletools/oleobj.py
... ... @@ -46,6 +46,7 @@ http://www.decalage.info/python/oletools
46 46 # 2016-07-18 v0.48 SL: - added Python 3.5 support
47 47 # 2016-07-19 PL: - fixed Python 2.6-7 support
48 48 # 2016-11-17 v0.51 PL: - fixed OLE native object extraction
  49 +# 2016-11-18 PL: - added main for setup.py entry point
49 50  
50 51 __version__ = '0.51'
51 52  
... ... @@ -380,7 +381,7 @@ def process_file(container, filename, data, output_dir=None):
380 381  
381 382 #=== MAIN =================================================================
382 383  
383   -if __name__ == '__main__':
  384 +def main():
384 385 # print banner with version
385 386 print ('oleobj %s - http://decalage.info/oletools' % __version__)
386 387 print ('THIS IS WORK IN PROGRESS - Check updates regularly!')
... ... @@ -436,4 +437,6 @@ if __name__ == '__main__':
436 437 continue
437 438 process_file(container, filename, data, options.output_dir)
438 439  
  440 +if __name__ == '__main__':
  441 + main()
439 442  
... ...
setup.py
... ... @@ -40,7 +40,7 @@ import os, fnmatch
40 40 #--- METADATA -----------------------------------------------------------------
41 41  
42 42 name = "oletools"
43   -version = '0.51a'
  43 +version = '0.51a1'
44 44 desc = "Python tools to analyze security characteristics of MS Office and OLE files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), for Malware Analysis and Incident Response #DFIR"
45 45 long_desc = open('oletools/README.rst').read()
46 46 author = "Philippe Lagadec"
... ... @@ -274,7 +274,8 @@ entry_points = {
274 274 'oletimes=oletools.oletimes:main',
275 275 'olevba=oletools.olevba:main',
276 276 'pyxswf=oletools.pyxswf:main',
277   - 'rtfobj=oletools.rtfobj:main'
  277 + 'rtfobj=oletools.rtfobj:main',
  278 + 'oleobj=oletools.oleobj:main',
278 279 ],
279 280 }
280 281  
... ...