Skip to content

aleff-github/PDF-Parser-VirusTotal-Based

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

PDF-Parser-VirusTotal-based

PDF Parser based on VirusTotal API

Hits

Licence

Licence

Components

Firefox

Language Used

NodeJS

OS Tested

Linux

OS UnTested

Mac OS Windows

Terminal helper

Example

Log file example

How to use

If you want to try this tool you can use a malicious file in docs created with metasploit.

YouTube Video

Use the command -h or --help for receive the following output...

-p		PDF file path to analyze
    or --path

-A		Set your VirusTotal API Key
    or --API-Key

-gA		Print your VirusTotal API Key
    or --Get-API-Key

-v		Use this argoument for view a lot more information
    or --verbose

-l		Save in a log file all verbose information
    or --log


Examples:

Set your API:
$ sudo python3 script.py -A <VirusTotal_API_Key>

See your API:
$ sudo python3 script.py -gA

Scan a pdf:
$ sudo python3 script.py -p malicious.pdf

Verbose output:
$ sudo python3 script.py -p malicious.pdf --verbose

Save a in a log file:
$ sudo python3 script.py -p malicious.pdf --log

Argouments

Argoument Required Format
--path yes -p /home/aleff/Documents/malicious.pdf
or -> -p malicious.pdf
--API-Key yes -A
--verbose no -v
--log no -l
--Get-API-Key no -gA

VirusTotal API

Signup to VirusTotal Website and go to Account -> API Key

FAQs

Why?

  • Developed for Network Security course of UNICAL Univeristy