✅ Tested and working on Linux systems
These scripts help you edit files while preserving the file's modification date (mtime) in Linux filesystems. This is useful when you need to maintain the appearance of when a file was last modified, even after editing it.
These scripts were developed for red teaming and security testing purposes. They enable security professionals to:
- Create Authentic Bait Files: Generate files that appear to have been created or modified at specific historical dates, making them more convincing for honeypots and deception operations
- Maintain Operational Security: Edit files during red team exercises without leaving obvious traces of recent modification timestamps
- Test Security Controls: Evaluate how security tools and analysts respond to files with manipulated timestamps
- Simulate Historical Artifacts: Create files that blend into existing file systems by matching modification dates of surrounding files
Ethical Use: These scripts are intended for authorized security testing, red team exercises, and legitimate security research only. Unauthorized use to deceive or harm is strictly prohibited.
The scripts work with any file type:
- Office documents (
.docx,.xlsx,.pptx, etc.) - Text files (
.txt,.md,.json, etc.) - Images, videos, PDFs
- Any file you can edit with applications
These scripts automatically detect Linux and use appropriate commands:
Monitors file changes and automatically restores timestamp after saving.
Captures the current timestamp before editing.
Restores the timestamp after editing.
./preserve_metadata.sh yourfile.extThis script will:
- Capture the current modification time
- Monitor for changes and automatically restore the timestamp when you save
# Step 1: Capture timestamp before editing
./capture_timestamp.sh yourfile.ext
# Step 2: Edit file normally, then save
# Step 3: Restore timestamp after editing
./restore_timestamp.sh yourfile.extIf you have a backup with the desired timestamp:
./restore_timestamp.sh yourfile.ext reference_file.ext-
Make the scripts executable:
chmod +x *.sh -
The scripts automatically detect Linux and use:
stat -c %Y <file>- Get modification timetouch -d @<timestamp> <file>- Set modification timedate -d @<timestamp>- Format timestamps
The scripts use Linux system tools to:
- Capture the original file modification time using
stat -c %Y - Allow normal editing - file content updates normally
- Restore the original filesystem timestamp using
touch -d
When using these scripts for red team operations:
-
Forensic Detection: Advanced forensic tools may detect timestamp manipulation through:
- File system journal analysis
- MAC (Modified, Accessed, Created) time inconsistencies
- Application-level metadata (e.g., Office document properties)
- File content hash changes without timestamp updates
-
Best Practices:
- Use reference files from the target environment when possible
- Test timestamp restoration on similar systems before operations
- Consider application-specific metadata that may reveal manipulation
- Document timestamp changes for post-operation analysis
-
Application Internal Metadata: Some applications (like Office suites) maintain internal metadata that cannot be preserved while saving changes.
-
File Permissions: Scripts need read/write access to the file and directory.
-
Monitoring Accuracy: The automated script monitors file size changes to detect saves, which may not catch all scenarios.
-
Multiple Saves: If you save multiple times during editing, the timestamp will be restored after each save.
-
Forensic Detection: These scripts only modify filesystem timestamps. Advanced forensic analysis may still detect manipulation.
Ensure you have write permissions to the file and directory.
Ensure stat, touch, and date are installed (they come pre-installed on most Linux distributions).
Check that the file exists and you have write permissions.
The Linux version doesn't automatically open files. Open them manually in your preferred application.
for file in *.xlsx; do
./capture_timestamp.sh "$file"
# Edit files...
./restore_timestamp.sh "$file"
donestat -c "Modification time: %y" yourfile.extfor file in *.pdf; do
./capture_timestamp.sh "$file"
# Edit files...
./restore_timestamp.sh "$file"
done# Capture timestamp from a legitimate file in the target directory
./capture_timestamp.sh /home/user/legitimate_document.docx
# Create/edit your bait file, then restore using the captured timestamp
./restore_timestamp.sh bait_file.docx /home/user/legitimate_document.docx./preserve_metadata.sh thesis.docx
# Edit in LibreOffice, save, timestamp automatically restored./capture_timestamp.sh budget.xlsx
# Edit spreadsheet...
./restore_timestamp.sh budget.xlsx✅ Successfully tested on Linux VM (Ubuntu-based system)
Test results:
- Original timestamp:
Fri Jan 16 08:58:26 AM EST 2026 - After modification:
Fri Jan 16 08:58:45 AM EST 2026 - After restoration:
✓ Successfully restored modification time: Fri Jan 16 08:58:26 AM EST 2026
These scripts are provided as-is for educational and practical use.