LinuxCommandLibrary

oleid

TLDR

Analyze Office document

$ oleid [document.doc]
copy
Analyze multiple files
$ oleid [*.docx]
copy
Output as JSON
$ oleid -j [document.xlsm]
copy
Verbose output
$ oleid -v [document.pptx]
copy

SYNOPSIS

oleid [options] files...

DESCRIPTION

oleid analyzes Microsoft Office documents to detect potential security issues. It identifies macros, encrypted content, external links, and other indicators of malicious content.
Part of the oletools suite, oleid provides quick triage for suspicious documents.

PARAMETERS

-j, --json

JSON output.
-v, --verbose
Verbose output.
-z password
ZIP password.
-l level
Log level.

INDICATORS

$ VBA Macros      - Contains VBA code
Auto-executable - Auto-run macros
Suspicious      - Suspicious keywords
Encrypted       - Password protected
External links  - External references
Flash objects   - Embedded Flash
copy

EXAMPLE OUTPUT

$ Indicator                 Value
VBA Macros                Yes
Auto-executable           Yes
Suspicious VBA            HIGH
Flash Objects             No
copy

CAVEATS

Heuristic analysis; may have false positives. Part of oletools package. Cannot analyze encrypted files without password.

HISTORY

oleid was developed by Philippe Lagadec as part of oletools, a Python toolkit for analyzing Microsoft OLE and Office files.

SEE ALSO

olevba(1), mraptor(1), oletools(1)

Copied to clipboard