winscp_decrypt.rb 362 B

123456789101112131415161718
  1. #!/usr/bin/env ruby
  2. ##
  3. # This module requires Metasploit: https://metasploit.com/download
  4. # Current source: https://github.com/rapid7/metasploit-framework
  5. ##
  6. $LOAD_PATH.unshift File.expand_path('../../lib', __FILE__)
  7. exit unless ARGV.count == 1
  8. include Rex::Parser::WinSCP
  9. puts ARGV.first
  10. read_and_parse_ini(ARGV.first).each do |res|
  11. puts res.inspect
  12. end