rapid7/metasploit-framework

View on GitHub
tools/exploit/exe2vbs.rb

Summary

Maintainability
A
2 hrs
Test Coverage
#!/usr/bin/env ruby

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

#
# This script converts an EXE to a vbs script
#
begin
msfbase = __FILE__
while File.symlink?(msfbase)
  msfbase = File.expand_path(File.readlink(msfbase), File.dirname(msfbase))
end

$:.unshift(File.expand_path(File.join(File.dirname(msfbase), '..', '..', 'lib')))
require 'msfenv'

$:.unshift(ENV['MSF_LOCAL_LIB']) if ENV['MSF_LOCAL_LIB']

require 'rex'

def usage
  $stderr.puts("    Usage: #{$0} [exe] [vbs]\n")
  exit
end

exe = ARGV.shift
vbs = ARGV.shift

if (not (exe and vbs))
  usage
end

out = File.new(vbs, "w")
inp = File.open(exe, "rb")

dat = ""
while(buf = inp.read(8192))
  dat << buf
end

out.write(Msf::Util::EXE.to_exe_vbs(dat))
out.close
inp.close

$stderr.puts "[*] Converted #{dat.length} bytes of EXE into a vbs script"
rescue SignalException => e
  puts("Aborted! #{e}")
end