ducky-g9av / Extension-Spoofer

Spoof your payloads/codes extensions into safe extensions | FUD

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

ExtSpoof


ExtSpoof is a framework that let you spoof your payloads
extensions into anothers using differents methods

Modules needed: subprocess, base64
Usage: python extspoof.py

#Example running extspoof.py
Method 1: Right To Left Spoofing
(ExtSpoof)>rlt <filename|payload> <new_extension>
Ex:
(ExtSpoof)>rlt stealer.exe jpg

Method 2: Python In-File Spoofing
[ Transform the fake image, pdf to open into base64 code,
and store it into the payload python file making the fake file open
at the start of the payload ]
(ExtSpoof)>ctm <filename|payload.py> <fake_file_to_open.pdf|png|etc>
Ex:
(ExtSpoof)>ctm chromestealer.py homework.pdf

#Example importing ExtSpoof
from extspoof import rlt

rlt("rlt <filename|payload> <new_extension>")
Ex:
rlt("rlt stealer.exe png")

About

Spoof your payloads/codes extensions into safe extensions | FUD


Languages

Language:Python 100.0%