A Python-based detection and removal script designed to identify and nullify Thinkst Canary Tokens embedded in files and directories. The tool operates through signature-based detection mechanisms to locate canary tokens, which are deception technology elements used for security monitoring. It provides multiple operational modes including test-only scanning for detection purposes and nullification mode for token removal. Key capabilities include: - Directory-based scanning to process multiple files simultaneously - Test mode for non-destructive token detection and reporting - Nullify mode for active token removal from detected files - Verbose output options for detailed operational feedback - Report generation functionality for documentation purposes - Support for various file formats through integrated tools like pdftk-java and pefile The script requires specific dependencies including Python 3, pdftk-java for PDF processing, and the pefile library for Windows executable analysis. Additional functionality is provided through integration with DidierStevens' disitool for enhanced file analysis capabilities. Installation involves cloning the repository, installing system dependencies via package managers like brew, and setting up Python requirements. The tool is designed as a proof-of-concept implementation with signature-based detection methods that could potentially be circumvented through token randomization or adjustment by the token provider.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An industrial control system testing tool that enables security researchers to enumerate SCADA controllers, read register values, and modify register data across different testing modes.
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.
An Active Defense framework for detecting and responding to phishing attacks in Office 365 Message Trace logs.
A data-mining and deep web asset search engine for breach analysis and prevention services.
Extract local data storage of an Android application in one click.
A hardware security validation toolkit for x86 platforms that provides bootable tools for checking platform configuration registers and managing SecureBoot keys.
Hashcat is a fast and advanced password recovery utility that supports various attack modes and hashing algorithms, and is open-source and community-driven.
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.