pdfalyzer 1.16.11__py3-none-any.whl → 1.16.12__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pdfalyzer might be problematic. Click here for more details.

CHANGELOG.md CHANGED
@@ -1,5 +1,8 @@
1
1
  # NEXT RELEASE
2
2
 
3
+ ### 1.16.12
4
+ * Bump `PyPDF` to v6.0.0
5
+
3
6
  ### 1.16.11
4
7
  * Fix typo in `combine_pdfs` help
5
8
  * Add some more PyPi classifiers
@@ -1,13 +1,13 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pdfalyzer
3
- Version: 1.16.11
3
+ Version: 1.16.12
4
4
  Summary: PDF analysis tool. Scan a PDF with YARA rules, visualize its inner tree-like data structure in living color (lots of colors), force decodes of suspicious font binaries, and more.
5
5
  Home-page: https://github.com/michelcrypt4d4mus/pdfalyzer
6
6
  License: GPL-3.0-or-later
7
- Keywords: ascii art,binary,color,cybersecurity,DFIR,encoding,font,infosec,maldoc,malicious pdf,malware,malware analysis,pdf,pdfs,pdf analysis,pypdf,threat assessment,visualization,yara
7
+ Keywords: ascii art,binary,color,cybersecurity,DFIR,encoding,font,infosec,maldoc,malicious pdf,malware,malware analysis,pdf,pdfs,pdf analysis,pypdf,threat assessment,threat hunting,threat intelligence,threat research,threatintel,visualization,yara
8
8
  Author: Michel de Cryptadamus
9
9
  Author-email: michel@cryptadamus.com
10
- Requires-Python: >=3.9.2,<4.0.0
10
+ Requires-Python: >=3.9.2,<4.0
11
11
  Classifier: Development Status :: 5 - Production/Stable
12
12
  Classifier: Environment :: Console
13
13
  Classifier: Intended Audience :: Information Technology
@@ -23,7 +23,7 @@ Classifier: Topic :: Artistic Software
23
23
  Classifier: Topic :: Scientific/Engineering :: Visualization
24
24
  Classifier: Topic :: Security
25
25
  Requires-Dist: anytree (>=2.13,<3.0)
26
- Requires-Dist: pypdf (>=5.9.0,<6.0.0)
26
+ Requires-Dist: pypdf (>=6.0.0,<7.0.0)
27
27
  Requires-Dist: yaralyzer (>=1.0.4,<2.0.0)
28
28
  Project-URL: Changelog, https://github.com/michelcrypt4d4mus/pdfalyzer/blob/master/CHANGELOG.md
29
29
  Project-URL: Documentation, https://github.com/michelcrypt4d4mus/pdfalyzer
@@ -65,10 +65,12 @@ If you're looking for one of these things this may be the tool for you.
65
65
  ### What It Don't Do
66
66
  This tool is mostly for examining/working with a PDF's data and logical structure. As such it doesn't have much to offer as far as extracting text, rendering[^3], writing, etc. etc.
67
67
 
68
+ If you suspect you are dealing with a malcious PDF you can safely run `pdfalyze` on it; embedded javascript etc. will not be executed. If you want to actually look at the contents of a suspect PDF you can use [`dangerzone`](https://dangerzone.rocks/) to sanitize the contents with extreme prejudice before opening it.
69
+
68
70
  -------------
69
71
 
70
72
  # Installation
71
-
73
+ #### All Platforms
72
74
  Installation with [pipx](https://pypa.github.io/pipx/)[^4] is preferred though `pip3` / `pip` should also work.
73
75
  ```sh
74
76
  pipx install pdfalyzer
@@ -76,7 +78,12 @@ pipx install pdfalyzer
76
78
 
77
79
  See [PyPDF installation notes](https://github.com/py-pdf/pypdf#installation) about `PyCryptodome` if you plan to `pdfalyze` any files that use AES encryption.
78
80
 
79
- If you are on macOS someone out there was kind enough to make [The Pdfalyzer available via homebrew](https://formulae.brew.sh/formula/pdfalyzer) so `brew install pdfalyzer` should work.
81
+ #### macOS Homebrew
82
+ If you are on macOS and use `homebrew` someone out there was kind enough to make [The Pdfalyzer available via homebrew](https://formulae.brew.sh/formula/pdfalyzer) so this should work:
83
+
84
+ ```sh
85
+ brew install pdfalyzer
86
+ ```
80
87
 
81
88
  ### Troubleshooting
82
89
  1. If you used `pip3` instead of `pipx` and have an issue you should try to install with `pipx`.
@@ -1,5 +1,5 @@
1
1
  .pdfalyzer.example,sha256=sh_qkUBw4hfJia_Dx2wB-fsqJInhx2sSgA7WJz3MHYo,3917
2
- CHANGELOG.md,sha256=ueR9OA8xj4EBFYitrcAJ6yGs1MXw7rnsCcpOdxrog0Q,12588
2
+ CHANGELOG.md,sha256=U2wCItuJQ6QY_zTAfeCDLq5-Ee12R1ImOtZN3PsYwjE,12626
3
3
  LICENSE,sha256=OXLcl0T2SZ8Pmy2_dmlvKuetivmyPd5m1q-Gyd-zaYY,35149
4
4
  pdfalyzer/__init__.py,sha256=Z7KzZamL44xFAE9_t6jX1-KhWAIn5f-voTo5BK8tlg8,5394
5
5
  pdfalyzer/__main__.py,sha256=Ko_AoAyYMLIe_cmhiUSl6twheLZrGyT8aOSJ2CP7EZY,43
@@ -43,8 +43,8 @@ pdfalyzer/yara_rules/__init.py__,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hS
43
43
  pdfalyzer/yara_rules/didier_stevens.yara,sha256=4XhqafU09xzYUP7LCygHHBXOpAXUblJf6Tkn37MUy0w,7253
44
44
  pdfalyzer/yara_rules/lprat.static_file_analysis.yara,sha256=i0CwRH8pBx_QshKFTQtr1CP5n378EZelsF2FxMY2y5A,21859
45
45
  pdfalyzer/yara_rules/pdf_malware.yara,sha256=jDqSTP5BQSi2I_1xZiFZdy68I4oVWDat2j08-qdfbto,91063
46
- pdfalyzer-1.16.11.dist-info/LICENSE,sha256=OXLcl0T2SZ8Pmy2_dmlvKuetivmyPd5m1q-Gyd-zaYY,35149
47
- pdfalyzer-1.16.11.dist-info/METADATA,sha256=Xa0oDRfBu_NyzjAiI4cG2tqrDxJZRx0mPErknDQcceA,26187
48
- pdfalyzer-1.16.11.dist-info/WHEEL,sha256=d2fvjOD7sXsVzChCqf0Ty0JbHKBaLYwDbGQDwQTnJ50,88
49
- pdfalyzer-1.16.11.dist-info/entry_points.txt,sha256=aZurgt-Xg3pojS7oTRI4hNLpK1hO4kTfChf0x2eQoD8,147
50
- pdfalyzer-1.16.11.dist-info/RECORD,,
46
+ pdfalyzer-1.16.12.dist-info/LICENSE,sha256=OXLcl0T2SZ8Pmy2_dmlvKuetivmyPd5m1q-Gyd-zaYY,35149
47
+ pdfalyzer-1.16.12.dist-info/METADATA,sha256=pze5-OjR5HEX6XTN0k9zJ-m_wjxhfmwm0RhVw5NGI28,26638
48
+ pdfalyzer-1.16.12.dist-info/WHEEL,sha256=d2fvjOD7sXsVzChCqf0Ty0JbHKBaLYwDbGQDwQTnJ50,88
49
+ pdfalyzer-1.16.12.dist-info/entry_points.txt,sha256=aZurgt-Xg3pojS7oTRI4hNLpK1hO4kTfChf0x2eQoD8,147
50
+ pdfalyzer-1.16.12.dist-info/RECORD,,