mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-05 14:57:30 +01:00
49 lines
815 B
Ruby
Executable File
49 lines
815 B
Ruby
Executable File
#!/usr/bin/env ruby
|
|
#
|
|
# $Id$
|
|
#
|
|
# This script converts an EXE to a vbs script
|
|
#
|
|
# $Revision$
|
|
#
|
|
|
|
msfbase = __FILE__
|
|
while File.symlink?(msfbase)
|
|
msfbase = File.expand_path(File.readlink(msfbase), File.dirname(msfbase))
|
|
end
|
|
|
|
$:.unshift(File.expand_path(File.join(File.dirname(msfbase), '..', 'lib')))
|
|
require 'fastlib'
|
|
require 'msfenv'
|
|
|
|
$:.unshift(ENV['MSF_LOCAL_LIB']) if ENV['MSF_LOCAL_LIB']
|
|
|
|
require 'rex'
|
|
require 'msf/base'
|
|
|
|
def usage
|
|
$stderr.puts(" Usage: #{$0} [exe] [vbs]\n")
|
|
exit
|
|
end
|
|
|
|
exe = ARGV.shift
|
|
vbs = ARGV.shift
|
|
|
|
if (not (exe and vbs))
|
|
usage
|
|
end
|
|
|
|
out = File.new(vbs, "w")
|
|
inp = File.open(exe, "rb")
|
|
|
|
dat = ""
|
|
while(buf = inp.read(8192))
|
|
dat << buf
|
|
end
|
|
|
|
out.write(Msf::Util::EXE.to_exe_vbs(dat))
|
|
out.close
|
|
inp.close
|
|
|
|
$stderr.puts "[*] Converted #{dat.length} bytes of EXE into a vbs script"
|