# Fortigate-Belsen-Leak-Dump-CVE-2022-40684
How This Script Works
Folder Traversal:
The script goes through all subfolders under root_folder and looks for vpn-passwords.txt.
Line Processing:
Skips any lines with the banner -=-= Belsen Group -=-=.
For lines with the username:password format:
Splits the line at the colon : using line.split(":", 1).
Extracts the part after the colon (password) and writes it to the output file.
Output:
Passwords are saved in the extracted_passwords.txt file, one password per line.
[4.0K] /data/pocs/a43785101dcd0164ad757479b1be38f8e8157418
├── [1.0K] extract passwords only
├── [ 937] python file to extract all credentials (username:password)
└── [ 521] README.md
0 directories, 3 files