diff --git a/README b/README index bd882f6..1ed0964 100644 --- a/README +++ b/README @@ -8,14 +8,27 @@ http://twitter.com/peepdf - In order to analyse Javascript code "PyV8" is needed: - http://code.google.com/p/pyv8/ + https://github.com/buffer/pyv8 + + git clone https://github.com/buffer/pyv8.git + cd pyv8 + python setup.py build + sudo python setup.py install + cd .. + rm -rf pyv8 - The "sctest" command is a wrapper of "sctest" (libemu). Besides libemu pylibemu is used and must be installed: - http://libemu.carnivore.it (latest version from git repository, Sourceforge package is outdated) + https://github.com/buffer/libemu https://github.com/buffer/pylibemu + git clone https://github.com/buffer/libemu.git + autoreconf -v -i + ./configure --prefix=/opt/libemu + sudo make install + sudo pip install pylibemu + - To support XML output "lxml" is needed: diff --git a/README.md b/README.md index 25dec3d..0b44b00 100644 --- a/README.md +++ b/README.md @@ -2,7 +2,7 @@ peepdf is a **Python tool to explore PDF files** in order to find out if the fil a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks. With peepdf it's possible to see all the objects in the document showing the suspicious elements, supports all the most used filters and encodings, it can parse different versions of a file, object streams and encrypted files. With the installation -of [PyV8](https://code.google.com/p/pyv8) and [Pylibemu](https://github.com/buffer/pylibemu) it provides **Javascript and shellcode analysis** wrappers too. Apart of this it's able to create new PDF files and to modify/obfuscate existent ones. +of [PyV8](https://github.com/buffer/pyv8) and [Pylibemu](https://github.com/buffer/pylibemu) it provides **Javascript and shellcode analysis** wrappers too. Apart of this it's able to create new PDF files and to modify/obfuscate existent ones. The main functionalities of peepdf are the following: