From b95f9aadbfa5943e3c8a540853441a31cb98ed90 Mon Sep 17 00:00:00 2001 From: "Mariusz B. / mgeeky" Date: Thu, 22 Dec 2022 10:22:20 +0100 Subject: [PATCH] Added msi-shenaningans --- file-formats/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/file-formats/README.md b/file-formats/README.md index 28bf263..bf51cd1 100644 --- a/file-formats/README.md +++ b/file-formats/README.md @@ -1,6 +1,6 @@ ## File-Formats Penetration Testing related scripts, tools and Cheatsheets -- [**`msi-shenanigans`**] - Proof of Concept code and samples presenting emerging threat of MSI installer files. Based on my [MSI Shenanignas 1 - Offensive Capabilities Overview](https://mgeeky.tech/msi-shenanigans-part-1/) research conducted. +- **`msi-shenanigans`** - Proof of Concept code and samples presenting emerging threat of MSI installer files. Based on my [MSI Shenanignas 1 - Offensive Capabilities Overview](https://mgeeky.tech/msi-shenanigans-part-1/) research conducted. - [**`PackMyPayload`**](https://github.com/mgeeky/PackMyPayload) - A script that takes file/directory on input and creates a new (or backdoors existing) container file with input ones embedded. Some of the formats (ISO, IMG, VHD, VHDX) could be used to bypass Mark-of-the-Web (MOTW) file taint flag. Supported formats: 1. `ZIP` (+password)