Thinkst Canarytokens Detector and Diffuser/Nullifier Logo

Thinkst Canarytokens Detector and Diffuser/Nullifier

0
Free
22
09 Dec 2023
10 September 2025
Visit Website

A Python-based detection and removal script designed to identify and nullify Thinkst Canary Tokens embedded in files and directories. The tool operates through signature-based detection mechanisms to locate canary tokens, which are deception technology elements used for security monitoring. It provides multiple operational modes including test-only scanning for detection purposes and nullification mode for token removal. Key capabilities include: - Directory-based scanning to process multiple files simultaneously - Test mode for non-destructive token detection and reporting - Nullify mode for active token removal from detected files - Verbose output options for detailed operational feedback - Report generation functionality for documentation purposes - Support for various file formats through integrated tools like pdftk-java and pefile The script requires specific dependencies including Python 3, pdftk-java for PDF processing, and the pefile library for Windows executable analysis. Additional functionality is provided through integration with DidierStevens' disitool for enhanced file analysis capabilities. Installation involves cloning the repository, installing system dependencies via package managers like brew, and setting up Python requirements. The tool is designed as a proof-of-concept implementation with signature-based detection methods that could potentially be circumvented through token randomization or adjustment by the token provider.

FEATURES

SIMILAR TOOLS

An industrial control system testing tool that enables security researchers to enumerate SCADA controllers, read register values, and modify register data across different testing modes.

Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.

Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.

An Active Defense framework for detecting and responding to phishing attacks in Office 365 Message Trace logs.

A data-mining and deep web asset search engine for breach analysis and prevention services.

Extract local data storage of an Android application in one click.

A hardware security validation toolkit for x86 platforms that provides bootable tools for checking platform configuration registers and managing SecureBoot keys.

Hashcat is a fast and advanced password recovery utility that supports various attack modes and hashing algorithms, and is open-source and community-driven.

iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.

PINNED

RoboShadow Logo

A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.

Vulnerability Management
Proton Pass Logo

Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.

Data Protection
NordVPN Logo

NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.

Network Security
Mandos Logo

Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Consulting
CybersecTools logoCybersecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved