A Python-based detection and removal script designed to identify and nullify Thinkst Canary Tokens embedded in files and directories. The tool operates through signature-based detection mechanisms to locate canary tokens, which are deception technology elements used for security monitoring. It provides multiple operational modes including test-only scanning for detection purposes and nullification mode for token removal. Key capabilities include: - Directory-based scanning to process multiple files simultaneously - Test mode for non-destructive token detection and reporting - Nullify mode for active token removal from detected files - Verbose output options for detailed operational feedback - Report generation functionality for documentation purposes - Support for various file formats through integrated tools like pdftk-java and pefile The script requires specific dependencies including Python 3, pdftk-java for PDF processing, and the pefile library for Windows executable analysis. Additional functionality is provided through integration with DidierStevens' disitool for enhanced file analysis capabilities. Installation involves cloning the repository, installing system dependencies via package managers like brew, and setting up Python requirements. The tool is designed as a proof-of-concept implementation with signature-based detection methods that could potentially be circumvented through token randomization or adjustment by the token provider.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An open-source phishing toolkit for businesses and penetration testers.
A Graphical Realism Framework for Industrial Control Simulation organized as 5 VirtualBox VMs for realistic ICS network simulation.
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
Python tool for monitoring user-select APIs in Android apps using Frida.
Hashcat is a fast and advanced password recovery utility that supports various attack modes and hashing algorithms, and is open-source and community-driven.
Web-based tool for browsing mobile applications sandbox and previewing SQLite databases.
A hardware security validation toolkit for x86 platforms that provides bootable tools for checking platform configuration registers and managing SecureBoot keys.
A comprehensive collection of wordlists for bruteforcing and password cracking, covering various hashing algorithms and sizes.
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.