
Tufin Orchestration Suite
Automates and orchestrates network security policy changes across heterogeneous environments.

The industry-standard Python suite for deconstructing and analyzing malicious Microsoft Office documents.

oletools is a comprehensive collection of Python tools designed for the triage, analysis, and extraction of data from Microsoft OLE2 and Office Open XML (OOXML) files. Developed by Philippe Lagadec, the suite provides essential capabilities for security analysts to inspect malicious documents without execution risk. In the 2026 cybersecurity landscape, oletools remains the foundational engine for static analysis pipelines, capable of identifying high-risk indicators such as VBA macros, XLM macros, DDE links, and embedded OLE objects. Its architecture allows for deep parsing of the Compound File Binary Format (CFBF), which is still prevalent in legacy enterprise environments. Key components like olevba offer automated de-obfuscation and keyword detection, while oleid provides a rapid risk-scoring mechanism. As threat actors continue to utilize document-based delivery for shellcode and ransomware, oletools serves as a critical bridge between initial file ingestion and sandboxed execution, enabling SOC teams to automate the extraction of Indicators of Compromise (IoCs) with high precision and low computational overhead.
oletools is a comprehensive collection of Python tools designed for the triage, analysis, and extraction of data from Microsoft OLE2 and Office Open XML (OOXML) files.
Explore all tools that specialize in vba macro extraction. This domain focus ensures oletools delivers optimized results for this specific requirement.
Parses VBA code to detect hex-strings, Chr() functions, and string concatenations often used by malware.
Analyzes the internal structure to detect macros, encryption, and DDE links in seconds.
Extracts and analyzes embedded OLE objects from Rich Text Format documents, often bypassing simple scanners.
Decryption of Office documents using known passwords or brute-force against common default passwords.
Provides both a CLI and GUI to manually browse the internal stream structure of OLE files.
Detects and extracts legacy Excel 4.0 macros which are frequently used to evade modern detection.
Extracts modification and creation timestamps from every stream inside an OLE file.
Verify Python 3.8+ is installed on the analysis workstation.
Install the suite via 'pip install -U oletools' to ensure all dependencies like colorama are met.
Utilize 'oleid [filename]' for an initial risk assessment and feature identification.
Run 'olevba [filename]' to extract VBA macro source code from OLE streams.
Use the '--deobfuscate' flag in olevba to resolve basic obfuscation techniques.
Employ 'msoffcrypto-tool' if the document is encrypted with the 'VelvetSweatshop' default password.
Execute 'rtfobj' on RTF files to extract embedded OLE objects or exploits.
Analyze document metadata using 'olemeta' to determine authoring source and timestamps.
Integrate the 'oletools' Python modules into custom automated malware triage scripts.
Review output JSON for ingestion into SIEM or Threat Intel Platforms.
All Set
Ready to go
Verified feedback from other users.
"Widely regarded as the 'Swiss Army Knife' for Office document analysis; trusted by every major security vendor."
Post questions, share tips, and help other users.

Automates and orchestrates network security policy changes across heterogeneous environments.

A fun, effective platform to learn cybersecurity through hands-on labs.

Uncovers exposed non-human identities (NHIs) and their secrets, securing everything from open-source projects to global enterprises.

Visual risk intelligence for preventing fraud using authenticated visuals and AI manipulation detection.

Browse privately, explore freely, and defend against tracking, surveillance, and censorship.

Gain visibility across your attack surface and accurately communicate cyber risk to support optimal business performance.