#!/usr/bin/env ruby ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## # # This script converts an EXE to a vbs script # msfbase = __FILE__ while File.symlink?(msfbase) msfbase = File.expand_path(File.readlink(msfbase), File.dirname(msfbase)) end $:.unshift(File.expand_path(File.join(File.dirname(msfbase), '..', '..', 'lib'))) require 'msfenv' $:.unshift(ENV['MSF_LOCAL_LIB']) if ENV['MSF_LOCAL_LIB'] require 'rex' require 'msf/base' def usage $stderr.puts(" Usage: #{$0} [exe] [vbs]\n") exit end exe = ARGV.shift vbs = ARGV.shift if (not (exe and vbs)) usage end out = File.new(vbs, "w") inp = File.open(exe, "rb") dat = "" while(buf = inp.read(8192)) dat << buf end out.write(Msf::Util::EXE.to_exe_vbs(dat)) out.close inp.close $stderr.puts "[*] Converted #{dat.length} bytes of EXE into a vbs script"