-
Notifications
You must be signed in to change notification settings - Fork 14
AutoIT Seeker
christian edited this page Aug 13, 2024
·
1 revision
This Python script analyzes AutoIT scripts for potential malicious indicators.
- Python 3.6 or higher
- pip (Python package installer)
-
Clone this repository or download the script and requirements.txt file.
-
Install the required packages:
pip install -r requirements.txt
The script can be run from the command line with the following options:
-
-por--path: Path to the directory to search for AutoIT scripts. -
-for--file: File path to a specific AutoIT script to analyze. -
--log-to-file: Optional flag to log output to a file instead of the console.
Analyze a single file:
python autoit_seeker.py -f path/to/script.au3
Analyze all AutoIT scripts in a directory:
python autoit_seeker.py -p path/to/directory
Log output to a file:
python autoit_seeker.py -p path/to/directory --log-to-file
- Open Command Prompt or PowerShell.
- Navigate to the directory containing the script:
cd path\to\script\directory - Run the script using Python:
python autoit_seeker.py -p path\to\analyze
- Open Terminal.
- Navigate to the directory containing the script:
cd path/to/script/directory - Run the script using Python:
python3 autoit_seeker.py -p path/to/analyze
After analysis, you'll be prompted to choose an output format:
- YAML
- CSV
- JSON
- RICH (colorized console output)
The results will be saved in the chosen format, and a reference YAML file will always be created.
Ensure you have the necessary permissions to read the files and directories you want to analyze.