{
	"id": "db84bdb0-d4d5-4cff-8996-e5cba4a9dbed",
	"created_at": "2026-04-06T00:13:49.908442Z",
	"updated_at": "2026-04-10T03:20:52.289308Z",
	"deleted_at": null,
	"sha1_hash": "f0f5324f3ba3fa013e3407f3211701980b213b72",
	"title": "GitHub - decalage2/oletools: oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 104012,
	"plain_text": "GitHub - decalage2/oletools: oletools - python tools to analyze MS\r\nOLE2 files (Structured Storage, Compound File Binary Format)\r\nand MS Office documents, for malware analysis, forensics and\r\ndebugging.\r\nBy decalage2\r\nArchived: 2026-04-02 12:00:28 UTC\r\npypi vv00..6600..22\r\n \r\nbuild unknown\r\n SSaayy TThhaannkkss !\r\noletools is a package of python tools to analyze Microsoft OLE2 files (also called Structured Storage, Compound\r\nFile Binary Format or Compound Document File Format), such as Microsoft Office 97-2003 documents, MSI\r\nfiles or Outlook messages, mainly for malware analysis, forensics and debugging. It is based on the olefile parser.\r\nIt also provides tools to analyze RTF files and files based on the OpenXML format (aka OOXML) such as MS\r\nOffice 2007+ documents, XPS or MSIX files.\r\nFor example, oletools can detect, extract and analyse VBA macros, OLE objects, Excel 4 macros (XLM) and DDE\r\nlinks.\r\nSee http://www.decalage.info/python/oletools for more info.\r\nQuick links: Home page - Download/Install - Documentation - Report Issues/Suggestions/Questions - Contact the\r\nAuthor - Repository - Updates on Twitter Cheatsheet\r\nNote: python-oletools is not related to OLETools published by BeCubed Software.\r\nNews\r\n2025-05-22 v0.60.3:\r\nolevba:\r\nfixed a security issue in the CLI display when ANSI escape codes are present (PR #873)\r\nencrypted files: password is now reported in the logs, added --decrypted_dir option (PR\r\n#842)\r\n2024-07-02 v0.60.2:\r\nolevba:\r\nfixed a bug in open_slk (issue #797, PR #769)\r\nfixed a bug due to new PROJECTCOMPATVERSION record in dir stream (PR #723, issues\r\n#700, #701, #725, #791, #808, #811, #833)\r\noleobj: fixed SyntaxError with Python 3.12 (PR #855), SyntaxWarning (PR #774)\r\nrtfobj: fixed SyntaxError with Python 3.12 (PR #854)\r\nhttps://github.com/decalage2/oletools\r\nPage 1 of 5\n\nclsid: added CLSIDs for MSI, Zed\r\nftguess: added MSI, PNG and OneNote formats\r\npyxswf: fixed python 3.12 compatibility (PR #841, issue #813)\r\nsetup/requirements: allow pyparsing 3 to solve install issues (PR #812, issue #762)\r\n2022-05-09 v0.60.1:\r\nolevba:\r\nfixed a bug when calling XLMMacroDeobfuscator (PR #737)\r\nremoved keyword \"sample\" causing false positives\r\noleid: fixed OleID init issue (issue #695, PR #696)\r\noleobj:\r\nadded simple detection of CVE-2021-40444 initial stage\r\nadded detection for customUI onLoad\r\nimproved handling of incorrect filenames in OLE package (PR #451)\r\nrtfobj: fixed code to find URLs in OLE2Link objects for Py3 (issue #692)\r\nftguess:\r\nadded PowerPoint and XPS formats (PR #716)\r\nfixed issue with XPS and malformed documents (issue #711)\r\nadded XLSB format (issue #758)\r\nimproved logging with common module log_helper (PR #449)\r\n2021-06-02 v0.60:\r\nftguess: new tool to identify file formats and containers (issue #680)\r\noleid: (issue #679)\r\neach indicator now has a risk level\r\ncalls ftguess to identify file formats\r\ncalls olevba+mraptor to detect and analyse VBA+XLM macros\r\nolevba:\r\nwhen XLMMacroDeobfuscator is available, use it to extract and deobfuscate XLM macros\r\nrtfobj:\r\nuse ftguess to identify file type of OLE Package (issue #682)\r\nfixed bug in re_executable_extensions\r\ncrypto: added PowerPoint transparent password '/01Hannes Ruescher/01' (issue #627)\r\nsetup: XLMMacroDeobfuscator, xlrd2 and pyxlsb2 added as optional dependencies\r\nSee the full changelog for more information.\r\nTools:\r\nTools to analyze malicious documents\r\noleid: to analyze OLE files to detect specific characteristics usually found in malicious files.\r\nolevba: to extract and analyze VBA Macro source code from MS Office documents (OLE and OpenXML).\r\nMacroRaptor: to detect malicious VBA Macros\r\nmsodde: to detect and extract DDE/DDEAUTO links from MS Office documents, RTF and CSV\r\nhttps://github.com/decalage2/oletools\r\nPage 2 of 5\n\npyxswf: to detect, extract and analyze Flash objects (SWF) that may be embedded in files such as MS\r\nOffice documents (e.g. Word, Excel) and RTF, which is especially useful for malware analysis.\r\noleobj: to extract embedded objects from OLE files.\r\nrtfobj: to extract embedded objects from RTF files.\r\nTools to analyze the structure of OLE files\r\nolebrowse: A simple GUI to browse OLE files (e.g. MS Word, Excel, Powerpoint documents), to view and\r\nextract individual data streams.\r\nolemeta: to extract all standard properties (metadata) from OLE files.\r\noletimes: to extract creation and modification timestamps of all streams and storages.\r\noledir: to display all the directory entries of an OLE file, including free and orphaned entries.\r\nolemap: to display a map of all the sectors in an OLE file.\r\nProjects using oletools:\r\noletools are used by a number of projects and online malware analysis services, including ACE, ADAPT, Anlyz.io,\r\nAssemblyLine, Binary Refinery, CAPE, CinCan, Cortex XSOAR (Palo Alto), Cuckoo Sandbox,\r\nDARKSURGEON, Deepviz, DIARIO, dridex.malwareconfig.com, EML Analyzer, EXPMON, FAME, FLARE-VM, GLIMPS Malware, Hybrid-analysis.com, InQuest Labs, IntelOwl, Joe Sandbox, Laika BOSS, MacroMilter,\r\nmailcow, malshare.io, malware-repo, Malware Repository Framework (MRF), MalwareBazaar, olefy, Pandora,\r\nPeekabooAV, pcodedmp, PyCIRCLean, QFlow, Qu1cksc0pe, Tylabs QuickSand, REMnux, Snake, SNDBOX,\r\nSplunk add-on for MS O365 Email, SpuriousEmu, Strelka, stoQ, Sublime Platform/MQL, Subparse,\r\nTheHive/Cortex, ThreatBoook, TSUGURI Linux, Vba2Graph, Viper, ViperMonkey, YOMI, and probably\r\nVirusTotal, FileScan.IO. And quite a few other projects on GitHub. (Please contact me if you have or know a\r\nproject using oletools)\r\nDownload and Install:\r\nThe recommended way to download and install/update the latest stable release of oletools is to use pip:\r\nOn Linux/Mac: sudo -H pip install -U oletools[full]\r\nOn Windows: pip install -U oletools[full]\r\nThis should automatically create command-line scripts to run each tool from any directory: olevba , mraptor ,\r\nrtfobj , etc.\r\nThe keyword [full] means that all optional dependencies will be installed, such as XLMMacroDeobfuscator. If\r\nyou prefer a lighter version without optional dependencies, just remove [full] from the command line.\r\nTo get the latest development version instead:\r\nOn Linux/Mac: sudo -H pip install -U https://github.com/decalage2/oletools/archive/master.zip\r\nOn Windows: pip install -U https://github.com/decalage2/oletools/archive/master.zip\r\nSee the documentation for other installation options.\r\nhttps://github.com/decalage2/oletools\r\nPage 3 of 5\n\nDocumentation:\r\nThe latest version of the documentation can be found online, otherwise a copy is provided in the doc subfolder of\r\nthe package.\r\nHow to Suggest Improvements, Report Issues or Contribute:\r\nThis is a personal open-source project, developed on my spare time. Any contribution, suggestion, feedback or\r\nbug report is welcome.\r\nTo suggest improvements, report a bug or any issue, please use the issue reporting page, providing all the\r\ninformation and files to reproduce the problem.\r\nYou may also contact the author directly to provide feedback.\r\nThe code is available in a GitHub repository. You may use it to submit enhancements using forks and pull\r\nrequests.\r\nLicense\r\nThis license applies to the python-oletools package, apart from the thirdparty folder which contains third-party\r\nfiles published with their own license.\r\nThe python-oletools package is copyright (c) 2012-2024 Philippe Lagadec (http://www.decalage.info)\r\nAll rights reserved.\r\nRedistribution and use in source and binary forms, with or without modification, are permitted provided that the\r\nfollowing conditions are met:\r\nRedistributions of source code must retain the above copyright notice, this list of conditions and the\r\nfollowing disclaimer.\r\nRedistributions in binary form must reproduce the above copyright notice, this list of conditions and the\r\nfollowing disclaimer in the documentation and/or other materials provided with the distribution.\r\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS \"AS IS\" AND\r\nANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED\r\nWARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE\r\nDISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR\r\nANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES\r\n(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS\r\nOF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY\r\nTHEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING\r\nNEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN\r\nIF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\r\nhttps://github.com/decalage2/oletools\r\nPage 4 of 5\n\nolevba contains modified source code from the officeparser project, published under the following MIT License\r\n(MIT):\r\nofficeparser is copyright (c) 2014 John William Davison\r\nPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated\r\ndocumentation files (the \"Software\"), to deal in the Software without restriction, including without limitation the\r\nrights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit\r\npersons to whom the Software is furnished to do so, subject to the following conditions:\r\nThe above copyright notice and this permission notice shall be included in all copies or substantial portions of the\r\nSoftware.\r\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\r\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS\r\nFOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR\r\nCOPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER\r\nIN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION\r\nWITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.\r\nSource: https://github.com/decalage2/oletools\r\nhttps://github.com/decalage2/oletools\r\nPage 5 of 5\n\n   https://github.com/decalage2/oletools   \nolevba contains modified source code from the officeparser project, published under the following MIT License\n(MIT):      \nofficeparser is copyright (c) 2014 John William Davison   \nPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated\ndocumentation files (the \"Software\"), to deal in the Software without restriction, including without limitation the\nrights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit\npersons to whom the Software is furnished to do so, subject to the following conditions: \nThe above copyright notice and this permission notice shall be included in all copies or substantial portions of the\nSoftware.      \nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES  OF MERCHANTABILITY, FITNESS\nFOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  IN NO EVENT SHALL THE AUTHORS OR\nCOPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER\nIN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION\nWITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. \nSource: https://github.com/decalage2/oletools      \n   Page 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://github.com/decalage2/oletools"
	],
	"report_names": [
		"oletools"
	],
	"threat_actors": [],
	"ts_created_at": 1775434429,
	"ts_updated_at": 1775791252,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f0f5324f3ba3fa013e3407f3211701980b213b72.pdf",
		"text": "https://archive.orkl.eu/f0f5324f3ba3fa013e3407f3211701980b213b72.txt",
		"img": "https://archive.orkl.eu/f0f5324f3ba3fa013e3407f3211701980b213b72.jpg"
	}
}