recentpopularlog in

kme : reverseengineering   13

Update: pdf-parser.py Version 0.7.0 | Didier Stevens
<code class="language-bash">
./pdf-parser.py -n document.pdf
./pdf-parser.py -s objstm document.pdf

# decode stream objects ('-f' = filter)
./pdf-parser.py -s objstm -f document.pdf

# force 'pdfid.py' to parse the output of above (even though it's
# missing a proper PDF header)
./pdf-parser.py -s objstm -f document.pdf | ./pdfid.py -n -f

# which is (I think?) is roughly the same as
./pdf-parser.py -a -O document.pdf
</code>
pdf  parser  reversing  reverseengineering  forensic  malware  analysis  commandline  python  video  streamobject  solution 
november 2019 by kme
Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept
Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers.

He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
privacy  security  antivirus  exploit  reverseengineering 
july 2015 by kme

Copy this bookmark:





to read