All Projects → eksperience → KnockOutlook

eksperience / KnockOutlook

Licence: BSD-3-Clause license
A little tool to play with Outlook

Programming Languages

C#
18002 projects

Labels

Projects that are alternatives of or similar to KnockOutlook

Some Pentesters SecurityResearchers RedTeamers
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
Stars: ✭ 60 (-68.09%)
Mutual labels:  redteam
SLib
SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#
Stars: ✭ 50 (-73.4%)
Mutual labels:  redteam
nTimetools
Timestomper and Timestamp checker with nanosecond accuracy for NTFS volumes
Stars: ✭ 25 (-86.7%)
Mutual labels:  redteam
DInvoke shellcodeload CSharp
ShellCodeLoader via DInvoke
Stars: ✭ 41 (-78.19%)
Mutual labels:  redteam
dummyDLL
Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-81.38%)
Mutual labels:  redteam
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-57.98%)
Mutual labels:  redteam
OSINTBookmarks
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-81.91%)
Mutual labels:  redteam
1earn
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+1876.06%)
Mutual labels:  redteam
Gopher
C# tool to discover low hanging fruits
Stars: ✭ 73 (-61.17%)
Mutual labels:  redteam
AggressorScripts 0x727
Cobalt Strike AggressorScripts For Red Team
Stars: ✭ 131 (-30.32%)
Mutual labels:  redteam
GoPhish-Templates
GoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (-59.57%)
Mutual labels:  redteam
palinka c2
Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-92.55%)
Mutual labels:  redteam
AggressiveGadgetToJScript
A Cobalt Strike Aggressor script to generate GadgetToJScript payloads
Stars: ✭ 90 (-52.13%)
Mutual labels:  redteam
aterm
It records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-90.96%)
Mutual labels:  redteam
HellgateLoader CSharp
Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
Stars: ✭ 73 (-61.17%)
Mutual labels:  redteam
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-67.55%)
Mutual labels:  redteam
DNSWho
transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Stars: ✭ 47 (-75%)
Mutual labels:  redteam
meteor
A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (-83.51%)
Mutual labels:  redteam
purple-team-exercise-framework
Purple Team Exercise Framework
Stars: ✭ 284 (+51.06%)
Mutual labels:  redteam
Jiraffe
One stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (-16.49%)
Mutual labels:  redteam

KnockOutlook

"The best feeling is to win by knockout." - Nonito Donaire

Overview

KnockOutlook is a C# project that interacts with Outlook's COM object in order to perform a number of operations useful in red team engagements.

Command Line Usage

      __ __                  __   ____        __  __            __
     / //_/____  ____  _____/ /__/ __ \__  __/ /_/ /___  ____  / /__
    / ,<  / __ \/ __ \/ ___/ //_/ / / / / / / __/ / __ \/ __ \/ //_/
   / /| |/ / / / /_/ / /__/ ,< / /_/ / /_/ / /_/ / /_/ / /_/ / ,<
  /_/ |_/_/ /_/\____/\___/_/\_\\____/\__,_/\__/_/\____/\____/_/\_\


Parameters:
    --operation :  specify the operation to run
    --keyword   :  specify a keyword for the 'search' operation
    --id        :  specify an EntryID for the 'save' operation
    --bypass    :  bypass the Programmatic Access Security settings (requires admin)

Operations:
    check       :  perform a number of checks to ensure operational security
    contacts    :  extract all contacts of every account
    mails       :  extract mailbox metadata of every account
    search      :  search for the provided keyword in every mailbox
    save        :  save a specified mail by its EntryID

Examples:
    KnockOutlook.exe --operation check
    KnockOutlook.exe --operation contacts
    KnockOutlook.exe --operation mails --bypass
    KnockOutlook.exe --operation search --keyword password
    KnockOutlook.exe --operation save --id {EntryID} --bypass

Operations

  • check

    Enumerates the Outlook installation details in order to construct the correct registry key and retrieve the Programmatic Access Security setting.

    If this value is set to Warn when antivirus is inactive or out-of-date it queries WMI for any installed antivirus products and parses their current state.

  • contacts

    Enumerates the contacts of every configured account and extracts the following information:

    • Full Name
    • Email Address
  • mails

    Enumerates the mails of every configured account and extracts the following metadata:

    • ID
    • Timestamp
    • Subject
    • From
    • To
    • Attachments
  • search

    Searches inside the mailbox of every configured account using Outlook's built-in search engine and returns the EntryID of mails that contain the provided keyword in their body.

  • save

    Uses Outlook's built-in Save As mechanism to export a mail referenced by its EntryID.

Object Model Guard Bypass

The --bypass switch can be used in conjunction with contacts, mails, search and save operations given the fact that the current process is running with high integrity level.

It will attempt to snapshot the current security policy of Outlook, patch it in a way that the Programmatic Access Security prompt is auto-allowed and finally revert it to its initial state after the operation has finished.

Output

All operations will output basic information on screen.

The contacts and mails operations will output results in JSON format to a Gzip compressed file.

The save operation will export the requested mail in .MSG format.

All filenames are randomly generated during runtime.

By default, Outlook's Secure Temp Folder is used as a destination for all exported files.

Authors

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].