Compare commits
3 Commits
fc7316a5bb
...
b95f9aadbf
Author | SHA1 | Date |
---|---|---|
Mariusz B. / mgeeky | b95f9aadbf | |
Mariusz B. / mgeeky | b300b51045 | |
Mariusz B. / mgeeky | b298879274 |
|
@ -70,3 +70,6 @@
|
|||
[submodule "phishing/CustomXMLPart"]
|
||||
path = phishing/CustomXMLPart
|
||||
url = https://github.com/mgeeky/CustomXMLPart
|
||||
[submodule "file-formats/msi-shenanigans"]
|
||||
path = file-formats/msi-shenanigans
|
||||
url = https://github.com/mgeeky/msi-shenanigans
|
||||
|
|
|
@ -1,5 +1,7 @@
|
|||
## File-Formats Penetration Testing related scripts, tools and Cheatsheets
|
||||
|
||||
- **`msi-shenanigans`** - Proof of Concept code and samples presenting emerging threat of MSI installer files. Based on my [MSI Shenanignas 1 - Offensive Capabilities Overview](https://mgeeky.tech/msi-shenanigans-part-1/) research conducted.
|
||||
|
||||
- [**`PackMyPayload`**](https://github.com/mgeeky/PackMyPayload) - A script that takes file/directory on input and creates a new (or backdoors existing) container file with input ones embedded. Some of the formats (ISO, IMG, VHD, VHDX) could be used to bypass Mark-of-the-Web (MOTW) file taint flag. Supported formats:
|
||||
1. `ZIP` (+password)
|
||||
2. `7zip` (+password)
|
||||
|
|
|
@ -0,0 +1 @@
|
|||
Subproject commit 1d5fdd57879f1553571a0e5a026f432c1317d410
|
Loading…
Reference in New Issue