PackageDNA gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information that allows them to know in advance if this library complies with processes. secure development, if currently supported, possible backdoors (malicious embedded code), typosquatting analysis, the history of versions and reported vulnerabilities (CVEs) of the package.
Installation
Clone this repository with:
git clone https://github.com/ElevenPaths/packagedna
PackageDNA uses python-magic which is a simple wrapper around the libmagic C library, and that MUST be installed as well:
Debian/Ubuntu
$ sudo apt-get install libmagic1
Windows
You will need DLLs for libmagic. @julian-r has uploaded a version of this project that includes binaries
to PyPI: https://pypi.python.org/pypi/python-magic-bin/0.4.14
Other sources of the libraries in the past have been File for Windows.
You will need to copy the file magic out of [binary-zip]\share\misc, and pass its location to Magic(magic_file=…).
If you are using a 64-bit build of python, you will need 64-bit libmagic binaries which can be found here: https://github.com/pidydx/libmagicwin64.
Newer version can be found here: https://github.com/nscaife/file-windows.
OSX
When using Homebrew: brew install libmagic
When using macports: port install file
More details: https://pypi.org/project/python-magic/
Run setup for installation:
python3 setup.py install –user
External Modules
PackageDNA uses external modules for its analysis that you should install previously:
Microsoft AppInpsector
https://github.com/microsoft/ApplicationInspector
Virus Total API
https://www.virustotal.com/
LibrariesIO API
https://libraries.io/
Rubocop
https://github.com/rubocop/rubocop
After installation you should configure the external modules, in the option [7] Configuration of the main menu.
[1] VirusTotal API Key: Your API KEY
[2] AppInspector absolute path: /Local/Path/MSAppInpsectorInstallation
[3] Libraries.io API Key: Your API KEY
[4] Github Token: Your Token
[B] Back
[X] Exit
NOTE: External modules are not mandatory. PackageDNA will continue its execution, however we recommend making all the configurations of these modules so that the tool performs a complete analysis
Inside the PackageDNA directory:
./packagedna.py
_ _ _
| _ \ | | | _ \ | \ | || |
| |) |_ _ _ | | _ _ _ _ | | \ \ | |\ \ | || || | | // |/ __)| |/ / / _
| / | / _ | | | || | \ | || | | | | (| || (_ | |\ \ | (| || (| || /| |/ / | | \ || | | | || __,|___)|| _\ _,| _ | ___||/ || _||| || | |
(_|
Modular Packages Analyzer Framework
By ElevenPaths https://www.elevenpaths.com/
Usage: python3 ./packagedna.py
[] ————————————————————————————————————– []
[!] Select from the menu:
[] ————————————————————————————————————– []
[1] Analyze Package (Last Version)
[2] Analyze Package (All Versions)
[3] Analyze local package
[4] Information gathering
[5] Upload file and analyze all Packages
[6] List previously analyzed packages
[7] Configurations
[X] Exit
[] ————————————————————————————————————– []
[!] Enter your selection:
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…