add readme
This commit is contained in:
parent
cb19abeae8
commit
67e8cac72b
28
README.md
Normal file
28
README.md
Normal file
@ -0,0 +1,28 @@
|
||||
#Email Checking
|
||||
*A collection of python scripts, useful apps, & the configurations for checking the legitimacy of emails in Windows Sandbox*
|
||||
|
||||
##Apps
|
||||
- Visual Studio Code
|
||||
- 7zip
|
||||
- Python 3
|
||||
- VLC
|
||||
|
||||
##Scripts
|
||||
###Extract.py
|
||||
Extracts file attachments & images from body of all .eml files in the directory it's executed in.
|
||||
###Decode.py
|
||||
Takes an input encoded in base64 and outputs the decoded text.
|
||||
***Does not work with streams containing newlines (\n)***
|
||||
- [ ] TODO: Process streams with newlines
|
||||
|
||||
##Prerequisites
|
||||
Windows Sandbox
|
||||
|
||||
##Installing
|
||||
Clone this to any directory and modify *Sandbox for Email.wsb* to change the *Host Folder* mapping to the absolute location of the *Sandbox Scripts* folder.
|
||||
|
||||
##How to use
|
||||
Copy the files to be evaluated (preferrably as encrypted .zip files) into the *Sandbox Scripts* folder.
|
||||
Execute *Sandbox for Email.wsb.* The *Sandbox Scripts* folder will be mapped as Read-Only, so you'll need to copy the needed files out of it.
|
||||
Typically, you'll only need top copy the .zip file and extract.py out.
|
||||
Extract the .zip file first. After that, you may need to run extract.py 2 or 3 times before it works.
|
||||
Loading…
x
Reference in New Issue
Block a user