The Python script aes_base64_log_decryptor.py will decrypt standard AES-base64 encrypted+encoded log files generated by implants and other red team tools. The expect log file format is as follows:
Each line is a base64-encoded IV+ciphertext blob, where the blob is the ciphertext appended to the initialization vector.
The underlying ciphertext was encrypted using 128- or 256-bit AES in either CTR (big endian) or CBC mode.
In other words, each line is of the format: base64(IV + AES(IV, plaintext))
A unit test Python script test_aes_base64_log_decryptor.py is provided - be sure to update this script with additional unit tests if extending the log decryptor script to support more decryption modes.