# Email Checking *A collection of python scripts, useful apps, & the configurations for checking the legitimacy of emails in Windows Sandbox* ## Apps - Visual Studio Code - 7zip - Python 3 - VLC ## Scripts ### Extract.py Extracts file attachments & images from body of all .eml files in the directory it's executed in. ### Decode.py Takes an input encoded in base64 and outputs the decoded text.
***Does not work with streams containing newlines (\n)*** - [ ] TODO: Process streams with newlines ## Prerequisites Windows Sandbox ## Installing Clone this to any directory and modify *Sandbox for Email.wsb* to change the *Host Folder* mapping to the absolute location of the *Sandbox Scripts* folder. ## How to use Copy the files to be evaluated (preferrably as encrypted .zip files) into the *Sandbox Scripts* folder.
Execute *Sandbox for Email.wsb.* The *Sandbox Scripts* folder will be mapped as Read-Only, so you'll need to copy the needed files out of it.
Typically, you'll only need to copy the .zip file and extract.py out.
Extract the .zip file first. After that, you may need to run extract.py 2 or 3 times before it works.