Skip to content

AutoIT Seeker

christian edited this page Aug 13, 2024 · 1 revision

AutoIT Seeker

This Python script analyzes AutoIT scripts for potential malicious indicators.

Requirements

  • Python 3.6 or higher
  • pip (Python package installer)

Installation

  1. Clone this repository or download the script and requirements.txt file.

  2. Install the required packages:

pip install -r requirements.txt

Usage

The script can be run from the command line with the following options:

  • -p or --path: Path to the directory to search for AutoIT scripts.
  • -f or --file: File path to a specific AutoIT script to analyze.
  • --log-to-file: Optional flag to log output to a file instead of the console.

Examples

Analyze a single file:

python autoit_seeker.py -f path/to/script.au3

Analyze all AutoIT scripts in a directory:

python autoit_seeker.py -p path/to/directory

Log output to a file:

python autoit_seeker.py -p path/to/directory --log-to-file

Running on Different Operating Systems

Windows

  1. Open Command Prompt or PowerShell.
  2. Navigate to the directory containing the script:
    cd path\to\script\directory
    
  3. Run the script using Python:
    python autoit_seeker.py -p path\to\analyze
    

macOS and Linux

  1. Open Terminal.
  2. Navigate to the directory containing the script:
    cd path/to/script/directory
    
  3. Run the script using Python:
    python3 autoit_seeker.py -p path/to/analyze
    

Output

After analysis, you'll be prompted to choose an output format:

  • YAML
  • CSV
  • JSON
  • RICH (colorized console output)

The results will be saved in the chosen format, and a reference YAML file will always be created.

Note

Ensure you have the necessary permissions to read the files and directories you want to analyze.

Clone this wiki locally