ExtSpoof is a framework that let you spoof your payloads
extensions into anothers using differents methods
Modules needed: subprocess, base64
Usage: python extspoof.py
#Example running extspoof.py
Method 1: Right To Left Spoofing
(ExtSpoof)>rlt <filename|payload> <new_extension>
Example:
(ExtSpoof)>rlt stealer.exe jpg
Method 2: Python In-File Spoofing
[ Will transform a fake image or pdf to open into base64 code,
and store it into the payload python file making the fake file open
at the start of the payload ]
(ExtSpoof)>ctm <filename|payload.py> <fake_file_to_open.pdf|png|etc>
Example:
(ExtSpoof)>ctm chromestealer.py homework.pdf
#Example importing ExtSpoof
from extspoof import rlt
rlt("rlt <filename|payload> <new_extension>")
Ex:
rlt("rlt stealer.exe png")