Skip to content
This repository was archived by the owner on Jul 29, 2024. It is now read-only.

aleff-github/PDF-Parser-VirusTotal-Based

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

PDF-Parser-VirusTotal-based

PDF Parser based on VirusTotal API

Hits

Licence

Licence

Components

Firefox

Language Used

NodeJS

OS Tested

Linux

OS UnTested

Mac OS Windows

Terminal helper

Example

Log file example

How to use

If you want to try this tool you can use a malicious file in docs created with metasploit.

YouTube Video

Use the command -h or --help for receive the following output...

-p	PDF file path to analyze or --path -A	Set your VirusTotal API Key or --API-Key -gA	Print your VirusTotal API Key or --Get-API-Key -v	Use this argoument for view a lot more information or --verbose -l	Save in a log file all verbose information or --log Examples: Set your API: $ sudo python3 script.py -A <VirusTotal_API_Key> See your API: $ sudo python3 script.py -gA Scan a pdf: $ sudo python3 script.py -p malicious.pdf Verbose output: $ sudo python3 script.py -p malicious.pdf --verbose Save a in a log file: $ sudo python3 script.py -p malicious.pdf --log 

Argouments

Argoument Required Format
--path yes -p /home/aleff/Documents/malicious.pdf
or -> -p malicious.pdf
--API-Key yes -A
--verbose no -v
--log no -l
--Get-API-Key no -gA

VirusTotal API

Signup to VirusTotal Website and go to Account -> API Key

FAQs

Why?

  • Developed for Network Security course of UNICAL Univeristy