pdfalyzer 1.16.2__tar.gz → 1.16.4__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pdfalyzer might be problematic. Click here for more details.

Files changed (45) hide show
  1. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/CHANGELOG.md +6 -0
  2. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/PKG-INFO +4 -2
  3. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/README.md +2 -0
  4. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/util/argument_parser.py +1 -1
  5. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pyproject.toml +4 -2
  6. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/LICENSE +0 -0
  7. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/__init__.py +0 -0
  8. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/__main__.py +0 -0
  9. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/binary/binary_scanner.py +0 -0
  10. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/config.py +0 -0
  11. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/decorators/document_model_printer.py +0 -0
  12. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/decorators/indeterminate_node.py +0 -0
  13. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/decorators/pdf_object_properties.py +0 -0
  14. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/decorators/pdf_tree_node.py +0 -0
  15. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/decorators/pdf_tree_verifier.py +0 -0
  16. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/detection/constants/binary_regexes.py +0 -0
  17. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/detection/constants/javascript_reserved_keywords.py +0 -0
  18. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/detection/javascript_hunter.py +0 -0
  19. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/detection/yaralyzer_helper.py +0 -0
  20. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/font_info.py +0 -0
  21. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/helpers/dict_helper.py +0 -0
  22. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/helpers/filesystem_helper.py +0 -0
  23. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/helpers/number_helper.py +0 -0
  24. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/helpers/pdf_object_helper.py +0 -0
  25. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/helpers/rich_text_helper.py +0 -0
  26. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/helpers/string_helper.py +0 -0
  27. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/output/character_mapping.py +0 -0
  28. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/output/layout.py +0 -0
  29. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/output/pdfalyzer_presenter.py +0 -0
  30. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/output/styles/node_colors.py +0 -0
  31. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/output/styles/rich_theme.py +0 -0
  32. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/output/tables/decoding_stats_table.py +0 -0
  33. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/output/tables/font_summary_table.py +0 -0
  34. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/output/tables/pdf_node_rich_table.py +0 -0
  35. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/output/tables/stream_objects_table.py +0 -0
  36. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/pdf_object_relationship.py +0 -0
  37. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/pdfalyzer.py +0 -0
  38. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/util/adobe_strings.py +0 -0
  39. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/util/debugging.py +0 -0
  40. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/util/exceptions.py +0 -0
  41. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/util/pdf_parser_manager.py +0 -0
  42. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/yara_rules/PDF.yara +0 -0
  43. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/yara_rules/PDF_binary_stream.yara +0 -0
  44. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/yara_rules/__init.py__ +0 -0
  45. {pdfalyzer-1.16.2 → pdfalyzer-1.16.4}/pdfalyzer/yara_rules/lprat.static_file_analysis.yara +0 -0
@@ -1,5 +1,11 @@
1
1
  # NEXT RELEASE
2
2
 
3
+ ### 1.16.4
4
+ * Bump `PyPDF` to 5.7.0
5
+
6
+ ### 1.16.3
7
+ * Fix typo in help
8
+
3
9
  ### 1.16.2
4
10
  * Add two more PDF related YARA rules
5
11
 
@@ -1,10 +1,10 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pdfalyzer
3
- Version: 1.16.2
3
+ Version: 1.16.4
4
4
  Summary: A PDF analysis toolkit. Scan a PDF with relevant YARA rules, visualize its inner tree-like data structure in living color (lots of colors), force decodes of suspicious font binaries, and more.
5
5
  Home-page: https://github.com/michelcrypt4d4mus/pdfalyzer
6
6
  License: GPL-3.0-or-later
7
- Keywords: ascii art,binary,color,font,encoding,malicious pdf,malware,malware analysis,pdf,threat assessment,visualization,yara
7
+ Keywords: ascii art,binary,color,font,encoding,maldoc,malicious pdf,malware,malware analysis,pdf,pdfs,pdf analysis,threat assessment,visualization,yara
8
8
  Author: Michel de Cryptadamus
9
9
  Author-email: michel@cryptadamus.com
10
10
  Requires-Python: >=3.9,<4.0
@@ -271,6 +271,8 @@ scripts/install_t1utils.sh
271
271
  * [A Curious Exploration of Malicious PDF Documents](https://www.scitepress.org/Papers/2020/89923/89923.pdf) by Julian Lindenhofer, Rene Offenthaler and Martin Pirker, 2020. Overview of all the possible execution paths that can lead to a PDF executing JavaScript, opening loca/remote files, or making web requests.
272
272
  * [Malicious PDF Generator](https://github.com/jonaslejon/malicious-pdf) is a well maintained GitHub project that does what it says on the tin.
273
273
  * [PDF is Broken, and so is this file](https://blog.trailofbits.com/2021/02/02/pdf-is-broken-a-justctf-challenge/) is a 2021 report on what happens when you challenge cybersecurity teams to turn PDFs into weapons. (Among other things they managed to create a PDF that launches a webserver when you open it.)
274
+ * [linuxPDF](https://github.com/ading2210/linuxpdf) is a project that managed to embed an entire linux operating system inside a PDF document. The related [DoomPDF](https://github.com/ading2210/doompdf) managed to embed the classic video game Doom in a PDF.
275
+ * [horrifying-pdf-experiments](https://github.com/osnr/horrifying-pdf-experiments) is a repo of horrifying things you can do with PDFs.
274
276
 
275
277
 
276
278
  ## Did The World Really Need Another PDF Tool?
@@ -241,6 +241,8 @@ scripts/install_t1utils.sh
241
241
  * [A Curious Exploration of Malicious PDF Documents](https://www.scitepress.org/Papers/2020/89923/89923.pdf) by Julian Lindenhofer, Rene Offenthaler and Martin Pirker, 2020. Overview of all the possible execution paths that can lead to a PDF executing JavaScript, opening loca/remote files, or making web requests.
242
242
  * [Malicious PDF Generator](https://github.com/jonaslejon/malicious-pdf) is a well maintained GitHub project that does what it says on the tin.
243
243
  * [PDF is Broken, and so is this file](https://blog.trailofbits.com/2021/02/02/pdf-is-broken-a-justctf-challenge/) is a 2021 report on what happens when you challenge cybersecurity teams to turn PDFs into weapons. (Among other things they managed to create a PDF that launches a webserver when you open it.)
244
+ * [linuxPDF](https://github.com/ading2210/linuxpdf) is a project that managed to embed an entire linux operating system inside a PDF document. The related [DoomPDF](https://github.com/ading2210/doompdf) managed to embed the classic video game Doom in a PDF.
245
+ * [horrifying-pdf-experiments](https://github.com/osnr/horrifying-pdf-experiments) is a repo of horrifying things you can do with PDFs.
244
246
 
245
247
 
246
248
  ## Did The World Really Need Another PDF Tool?
@@ -80,7 +80,7 @@ select.add_argument('-r', '--rich', action='store_true',
80
80
  help='show much larger / more detailed tree visualization (one row per PDF object property)')
81
81
 
82
82
  select.add_argument('-f', '--fonts', action='store_true',
83
- help="show info about fonts included character mappings for embedded font binaries")
83
+ help="show info about fonts including character mappings for embedded font binaries")
84
84
 
85
85
  select.add_argument('-y', '--yara', action='store_true',
86
86
  help="scan the PDF with the included malicious PDF YARA rules and/or your custom YARA rules")
@@ -1,6 +1,6 @@
1
1
  [tool.poetry]
2
2
  name = "pdfalyzer"
3
- version = "1.16.2"
3
+ version = "1.16.4"
4
4
  description = "A PDF analysis toolkit. Scan a PDF with relevant YARA rules, visualize its inner tree-like data structure in living color (lots of colors), force decodes of suspicious font binaries, and more."
5
5
  authors = ["Michel de Cryptadamus <michel@cryptadamus.com>"]
6
6
  license = "GPL-3.0-or-later"
@@ -15,10 +15,13 @@ keywords = [
15
15
  "color",
16
16
  "font",
17
17
  "encoding",
18
+ "maldoc",
18
19
  "malicious pdf",
19
20
  "malware",
20
21
  "malware analysis",
21
22
  "pdf",
23
+ "pdfs",
24
+ "pdf analysis",
22
25
  "threat assessment",
23
26
  "visualization",
24
27
  "yara"
@@ -33,7 +36,6 @@ classifiers = [
33
36
  include = [
34
37
  "CHANGELOG.md",
35
38
  "LICENSE"
36
- #{ path = "doc" }
37
39
  ]
38
40
 
39
41
  packages = [
File without changes