28 lines
1.1 KiB
Markdown
28 lines
1.1 KiB
Markdown
#Email Checking
|
|
*A collection of python scripts, useful apps, & the configurations for checking the legitimacy of emails in Windows Sandbox*
|
|
|
|
##Apps
|
|
- Visual Studio Code
|
|
- 7zip
|
|
- Python 3
|
|
- VLC
|
|
|
|
##Scripts
|
|
###Extract.py
|
|
Extracts file attachments & images from body of all .eml files in the directory it's executed in.
|
|
###Decode.py
|
|
Takes an input encoded in base64 and outputs the decoded text.
|
|
***Does not work with streams containing newlines (\n)***
|
|
- [ ] TODO: Process streams with newlines
|
|
|
|
##Prerequisites
|
|
Windows Sandbox
|
|
|
|
##Installing
|
|
Clone this to any directory and modify *Sandbox for Email.wsb* to change the *Host Folder* mapping to the absolute location of the *Sandbox Scripts* folder.
|
|
|
|
##How to use
|
|
Copy the files to be evaluated (preferrably as encrypted .zip files) into the *Sandbox Scripts* folder.
|
|
Execute *Sandbox for Email.wsb.* The *Sandbox Scripts* folder will be mapped as Read-Only, so you'll need to copy the needed files out of it.
|
|
Typically, you'll only need top copy the .zip file and extract.py out.
|
|
Extract the .zip file first. After that, you may need to run extract.py 2 or 3 times before it works. |