diff --git a/README.md b/README.md index c1fdcd5..96e5e44 100644 --- a/README.md +++ b/README.md @@ -1,27 +1,27 @@ -#Email Checking +# Email Checking *A collection of python scripts, useful apps, & the configurations for checking the legitimacy of emails in Windows Sandbox* -##Apps +## Apps - Visual Studio Code - 7zip - Python 3 - VLC -##Scripts -###Extract.py +## Scripts +### Extract.py Extracts file attachments & images from body of all .eml files in the directory it's executed in. -###Decode.py +### Decode.py Takes an input encoded in base64 and outputs the decoded text. ***Does not work with streams containing newlines (\n)*** - [ ] TODO: Process streams with newlines -##Prerequisites +## Prerequisites Windows Sandbox -##Installing +## Installing Clone this to any directory and modify *Sandbox for Email.wsb* to change the *Host Folder* mapping to the absolute location of the *Sandbox Scripts* folder. -##How to use +## How to use Copy the files to be evaluated (preferrably as encrypted .zip files) into the *Sandbox Scripts* folder. Execute *Sandbox for Email.wsb.* The *Sandbox Scripts* folder will be mapped as Read-Only, so you'll need to copy the needed files out of it. Typically, you'll only need top copy the .zip file and extract.py out.