Skip to content

Spoof your payloads/codes extensions into safe extensions | FUD

Notifications You must be signed in to change notification settings

Loubaris/Extension-Spoofer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 

Repository files navigation

ExtSpoof


ExtSpoof is a framework that let you spoof your payloads
extensions into anothers using differents methods

Modules needed: subprocess, base64
Usage: python extspoof.py

#Example running extspoof.py
Method 1: Right To Left Spoofing
(ExtSpoof)>rlt <filename|payload> <new_extension>
Example:
(ExtSpoof)>rlt stealer.exe jpg

Method 2: Python In-File Spoofing
[ Will transform a fake image or pdf to open into base64 code,
and store it into the payload python file making the fake file open
at the start of the payload ]
(ExtSpoof)>ctm <filename|payload.py> <fake_file_to_open.pdf|png|etc>
Example:
(ExtSpoof)>ctm chromestealer.py homework.pdf

#Example importing ExtSpoof
from extspoof import rlt

rlt("rlt <filename|payload> <new_extension>")
Ex:
rlt("rlt stealer.exe png")

About

Spoof your payloads/codes extensions into safe extensions | FUD

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages