Tools to analyze security characteristics of MS Office and OLE files
http://www.decalage.info/python/oletools
Python tools to analyze security characteristics of MS Office and OLE files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), for Malware Analysis and Incident Response (DFIR)
- Sources inherited from project devel:languages:python
- Devel package for openSUSE:Factory
-
2
derived packages
- Links to openSUSE:Factory / python-oletools
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:Tomcat42/python-oletools && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
oletools-0.60.1.zip | 0003382775 3.23 MB | |
python-oletools.changes | 0000003546 3.46 KB | |
python-oletools.spec | 0000004799 4.69 KB |
Revision 10 (latest revision is 11)
Sebastian Wagner (sebix)
committed
(revision 10)
- Update to version 0.60.1: * olevba: * fixed a bug when calling XLMMacroDeobfuscator (PR #737) * removed keyword "sample" causing false positives * oleid: fixed OleID init issue (issue #695, PR #696) * oleobj: * added simple detection of CVE-2021-40444 initial stage * added detection for customUI onLoad * improved handling of incorrect filenames in OLE package (PR #451) * rtfobj: fixed code to find URLs in OLE2Link objects for Py3 (issue #692) * ftguess: * added PowerPoint and XPS formats (PR #716) * fixed issue with XPS and malformed documents (issue #711) * added XLSB format (issue #758) * improved logging with common module log_helper (PR #449) * More details about fixed issues and improvements in 0.60: https://github.com/decalage2/oletools/milestone/10?closed=1
Comments 0