python-oletools v0.10 documentation
===================================
This is the home page of the documentation for python-oletools. The latest version can be found
online, otherwise a copy is provided in the doc subfolder of the package.
python-oletools is a package of python tools to analyze
(also called Structured Storage, Compound File Binary Format or Compound Document File Format),
such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging.
It is based on the olefile parser.
See http://www.decalage.info/python/oletools for more info.
Quick links: Home page -
Report Issues/Suggestions/Questions -
Note: python-oletools is not related to OLETools published by BeCubed Software.
Tools in python-oletools:
view and extract individual data streams.
oleid: a tool to analyze OLE files to detect specific characteristics usually found in malicious files.
olemeta: a tool to extract all standard properties (metadata) from OLE files.
oletimes: a tool to extract creation and modification timestamps of all streams and storages.
olevba: a tool to extract and analyze VBA Macro source code from MS Office documents (OLE and OpenXML).
pyxswf: a tool to detect, extract and analyze Flash objects (SWF) that may
be embedded in files such as MS Office documents (e.g. Word, Excel) and RTF,
which is especially useful for malware analysis.
rtfobj: a tool and python module to extract embedded objects from RTF files.
and a few others (coming soon)
python-oletools documentation