recentpopularlog in

kme : forensics   45

Decompress FlateDecode Objects in PDF
Tips on how to get working in Python 3 here: https://stackoverflow.com/a/53609642/785213

<code class="language-python">import re
import zlib

pdf = open("some_doc.pdf", "rb").read()
stream = re.compile(r'.*?FlateDecode.*?stream(.*?)endstream', re.S)

for s in stream.findall(pdf):
s = s.strip('\r\n')
try:
print(zlib.decompress(s))
print("")
except:
pass</code>
python  pdf  reversing  forensics  objectstream  flatedecode  zlib 
11 weeks ago by kme
Converting Binary Plists - ForensicsWiki
<code class="language-bash">plutil -convert xml1 file.plist</code>
plist  propertylist  forensics  xml  macos  mac  solution 
september 2019 by kme
List commits between 2 commit hashes in git - Stack Overflow
I ended up using
<code class="language-bash">git log -L 150,180:builtins/shopt.def bash-4.1.11..bash-4.3</code>
to solve the problem I was having (which version of Bash introduced the 'direxpand' option to 'shopt'; hint: 4.2.29)

See also: https://unix.stackexchange.com/q/498857/278323
devel  git  commit  history  automation  forensics  sortof  solution 
august 2019 by kme
Passware Password Recovery Kit Forensic
Supposedly this broke TrueCrypt (on a Firewire drive)
bruteforce  cracking  password  recovery  forensics  sofware 
december 2013 by kme

Copy this bookmark:





to read