Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/lukeroantree4815162342/embedded-threat-alerting-prototype
prototype I made for a hackathon, scans emails for potentially malicious attachments and edits the email to warn the reciever, explain the threat, and generate a 'safe' version of the attachment.
https://github.com/lukeroantree4815162342/embedded-threat-alerting-prototype
email email-parsing gui prototype python3
Last synced: 5 days ago
JSON representation
prototype I made for a hackathon, scans emails for potentially malicious attachments and edits the email to warn the reciever, explain the threat, and generate a 'safe' version of the attachment.
- Host: GitHub
- URL: https://github.com/lukeroantree4815162342/embedded-threat-alerting-prototype
- Owner: LukeRoantree4815162342
- License: mit
- Created: 2018-11-02T12:33:14.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2018-11-02T14:08:13.000Z (about 6 years ago)
- Last Synced: 2024-11-13T00:31:58.347Z (2 months ago)
- Topics: email, email-parsing, gui, prototype, python3
- Language: Python
- Size: 86.9 KB
- Stars: 1
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Prototype for rendering safe and alerting of Embedded Threats sent over Email
# DO NOT OPEN 'exploit.csv' IN EXCEL!
## It is an example of the type of exploit this prototype prevents against
## I hard-coded it for my computer, but I don't gaurantee it won't post your credentials online if you open it. (Note opening it in Excel on a Windows computer will try to send the recievers SSH keys to a public-facing website. I will *not* accept any feature/pull requests that involve improving the exploit - I wrote it as an example of what *could* be sent and should not be used anywhere by anyone.
---
# Usage:
### run python scan_eml.py, follow the steps in the GUI. Note you'll need to have your email downloaded locally as a .eml file.
# Demo:
> view 'QuarterlyReportOriginal.eml' in outlook to see how it looks initially
> run python scan_eml.py, select 'QuarterlyReportOriginal.eml' in the GUI
> view 'QuarterlyReportEmail.eml' in outlook to see how the program has changed it.
---
## Exploit Details:
### This Prototype currently only works for a particular form of embedded exploits, and only in .csv format. It relies on spreadsheet programs such as Excel automatically trying to run 'formulae' in cells.