Skip to main content

Create self-extracting and/or password protected HTML pages with arbitrary contents

Project description

self-unzip.html

PyPI version License Python versions

This repo contains tools to create self-extracting HTML pages. It works by taking a payload, compressing it, and encoding the results using ASCII85. It then puts the resulting string in a template file, that contains the code to decode and decompress the payload again.

Currently there are three actions implemented, that can be executed, after the payload is decoded:

  • eval: Execute payload as JavaScript code (example usecase: obfuscate malicious JS code)
  • replace: Show payload as HTML page (example usecase: compress a big web page)
  • download: Download the payload as a file (example usecase: bypass antivirus / filters)

Demo

You can try the online demo at self-extracting-html.six-two.dev. This version is the same as the web version described below. It is entirely client-site, your files do not get uploaded to a server.

Installation

There are both a web and a python version. The web version is not actively developed anymore and very bare bones, but easy to use and requires no installation. The Python version has more features and is generally recommended.

Current feature comparision

Currently the python version has the most features.

Feature Web version Python version
Base64 encoding no yes
Ascii85 encoding yes yes
GZIP compression yes, always yes, can be disabled
AES-GCM encryption no yes
Automatic detection of most efficient algorithms no yes

Python version

A Python script to generate self extracting web pages is under python/main.py. It just requires a modern Python version (probably Python3.9+) and has no mandatory external dependencies. But if you want to use the encryption feature, you need to install pycryptodomex with pip.

You can install it with pip or docker.

pip

To install the latest release:

python3 -m pip install -U self-unzip-html

If you want to have the bleeding edge version (main branch), you can clone the repository and run:

python3 -m pip install .

Example usage of the pip package:

self-unzip-html --download -o psexec.html ~/Downloads/SysinternalsSuite/PsExec.exe

Or if you wanted to password-protect the output:

self-unzip-html --download -o psexec.html -p YourPasswordHere ~/Downloads/SysinternalsSuite/PsExec.exe

Docker

You can use the image pushed to ghcr.io:

docker run --rm -v "$PWD:/share" ghcr.io/six-two/self-unzip-html --download -o psexec.html ./PsExec.exe 

To use the bleeding edge version (main branch), you can build the Dockerfile:

docker build -t self-unzip-html .

Usage of docker image:

docker run --rm -v "$PWD:/share" self-unzip-html --download -o psexec.html ./PsExec.exe 

You can show all flags with the --help flag and can see some example commands in ./test.sh.

Phishing

If you want to use it for phishing (sending a download link to a malicious file), the --driveby-redirect is likely what you want. It starts a download and immediately redirects to any URL you choose, so that it looks like the other site started the download:

Driveby Redirect Screenshot

Just search for a "thank you for downloading" page that does not start a download. There are many of them for software like Skype, AnyDesk, etc. Then rename your payload file to something an visitor of the download page would expect and create the HTML smuggling page:

self-unzip-html.py AnyDesk.exe -o anydesk-download.html --driveby-redirect https://anydesk.com/en/downloads/guide/thank-you --obscure-action

Host that HTML file on your server and link to it in your emails.

Encryption

Encryption uses AES-GCM for encryption and tamper detection and PBKDF2 with slightly over 1 million rounds of SHA-256 for password derivation. The code has not been audited, so use it with caution. If data security is very important to you may want to manually encrypt it beforehand (for example using gpg).

You can automatically decrypt a page by adding the password as the hash in a URL like encrypted.html#monkey123!. The hash will not be sent to the server, so your password may only be stored locally (in your browsing history). Otherwise a prompt will ask you for the password.

Custom actions

With the --custom flag you can specify your own JavaScript that should handle the unpacked data. The data is passed via the og_data parameter. The value is an Uint8Array which represents the bytes of the input file. If you want to interpret it as UTF-8 text and convert it to a string, you can use new TextDecoder().decode(og_data). If you want to build your payload based on one of the builtin payloads, you can find them in python/self_unzip_html/static_js.py

When debugging your own payload it can be useful to see go through it step by step. For this I find it easiest to create an page with:

self-unzip-html README.md --custom 'window.og_data = og_data' -o test_custom.html

The resulting page exposes og_data in the global scope. You can then paste your payload into the JavaScript console piece by piece and inspect the output or DOM in between.

Web version

There is a bare-bones page generator written in plain HTML and JavaScript. To use it, just clone the repo and put the contents of the site directory somewhere in your web server directory.

You can of course also use it with Python's built in web server:

python3 -m http.server --directory ./site/

I also host it via Vercel at https://self-extracting-html.six-two.dev/.

JavaScript code

Python

The JavaScript code is modular to decrease size and allow mixing and matching different algorithms. The unminified files are in code_to_minify/. They are minified by running code_to_minify/build.sh, which updates python/self_unzip_html/minified_js.py.

template.html

This basically just explains, how I generated the obfuscated script in template.html (JavaScript version). In case you are paranoid, you can reproduce the steps. Or if there is an important update to fflate or ascii85, I will have to run them again.

Install with npm:

npm install .

First use rollup to only select the actually used code:

./node_modules/.bin/rollup -c rollup.config.js

This command should create output/main.js

The next step is optional. If you want to skip it, just rename main.min.js to main.js in the output directory. Otherwise minify the code (may require you to install an external minifier like closure-compiler).

closure-compiler output/main.js --js_output_file output/main.min.js

Notable changes

Version 0.2.1

  • Added Dockerfile and published image docker pull ghcr.io/six-two/self-unzip-html
  • Added --show-text action, which shows the payload as plain text

Version 0.2.0

  • Breaking change: Replaced the --type parameter with specific flags like --download, --driveby-redirect, --eval, --replace, and --custom.
    • --download now has an optional parameter that allows you to change the file's name.
    • --driveby-redirect allows you to perform a driveby download and redirect the visitor immediately to another page.
    • --custom allows you to provide your own JavaScript code, which is useful for not implemented techniques or special usecases.
  • Password protection now encrypts the payload action too. This should prevent anyone without the password from inspecting the file and for example seeing that it performs a drive by download and redirects to a specific site.
  • The debugging console messages are disabled by default, which results in nicer and shorter code. If enabled with the --console-log flag, the data will be formatted as hex dumps for easier debugging.
  • Added --html, --html-file and --title options to change the visual appearence of the initial page without needing a whole custom template.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

self_unzip_html-0.2.1.tar.gz (18.9 kB view details)

Uploaded Source

Built Distribution

self_unzip_html-0.2.1-py3-none-any.whl (17.2 kB view details)

Uploaded Python 3

File details

Details for the file self_unzip_html-0.2.1.tar.gz.

File metadata

  • Download URL: self_unzip_html-0.2.1.tar.gz
  • Upload date:
  • Size: 18.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.0.1.dev0+g94f810c.d20240510 CPython/3.12.5

File hashes

Hashes for self_unzip_html-0.2.1.tar.gz
Algorithm Hash digest
SHA256 4bcdee59b37d38dbc1bead451508fdea7d821f50d60db5cf44ac2cc77503ab27
MD5 130ae1b7f47c5d27829903cd941d2927
BLAKE2b-256 ecb8fb8efd5325d6e341b6d88f3ec99e5ef97308487eb80f96d0ccf19fa4092e

See more details on using hashes here.

File details

Details for the file self_unzip_html-0.2.1-py3-none-any.whl.

File metadata

  • Download URL: self_unzip_html-0.2.1-py3-none-any.whl
  • Upload date:
  • Size: 17.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.0.1.dev0+g94f810c.d20240510 CPython/3.12.5

File hashes

Hashes for self_unzip_html-0.2.1-py3-none-any.whl
Algorithm Hash digest
SHA256 157f47e6b37b5c07754dfd481b90d5dddb12f9fca79794ef78b7078e18a7acdb
MD5 a87fc2069e9d5e709e9f95c5e0c8696d
BLAKE2b-256 547f7a1bcecc9de0a3740d34d6067aa6d1376c8375889a7bb5f7708c5cff4d7f

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page