olevba
all
Parse OLE and OpenXML files (e.g., DOC, XLS, PPT, etc.) to extract VBA macros, deobfuscate, and analyze malicious code. Part of the `python-oletools` suite.
More info →Options (3)
-p, --passwordbooleanProvide a password for encrypted Microsoft Office files (may be repeated)
Example:
olevba {{[-p|--password]}} {{password}} {{path/to/encrypted_file}}-a, --analysisbooleanDisplay only analysis results, without showing macro source code
Example:
olevba {{[-a|--analysis]}} {{path/to/file}}-c, --codebooleanDisplay only macro source code
Example:
olevba {{[-c|--code]}} {{path/to/file}}Examples (6)
Analyze a file, showing both macro code and analysis results
olevba path/to/fileRecursively analyze all supported files in a directory
olevba -r path/to/directoryProvide a password for encrypted Microsoft Office files (may be repeated)
olevba [-p|--password] password path/to/encrypted_fileDisplay only analysis results, without showing macro source code
olevba [-a|--analysis] path/to/fileDisplay only macro source code
olevba [-c|--code] path/to/fileShow obfuscated strings and their decoded content
olevba --decode path/to/filemade by @shridhargupta | data from tldr-pages