Skip to content
Go to file

Latest commit


Git stats


Failed to load latest commit information.
Latest commit message
Commit time

PuTTY Extractor

PuTTY Extractor is a simple script that extracts your PuTTY config for SSH & Telnet and parses it out as connection strings for linux/unix/osx command lines.

I put this together in an evening so it's not feature rich. I personally didn't require this tool but thought it might be a nice learning experience.

My main intention was to use the output of the tool to create aliases or port over my sessions to another operating system. It is also helpful at showing where all your keys are if you're untidy like me and spread them all over your system.


> python
> ssh -p "22" -i "C:\secret.txt" -t "screen -xRR"
> ssh nullmode@ -p "22"
> telnet 22


The script comes in two flavours: PowerShell and Python. Both scripts work the same.

The PowerShell script should be able to be run as is.

The Python script requires the dependancy in the requirements file, so before running you'll need to:

pip install -r requirements.txt

If you don't have pip you'll need to install winreg_unicode: http://


Currently only SSH and Telnet sessions will be extracted, along with a couple of options from the settings file. This may change in the future.

If your PuTTY config is saved outside of the system registry the extraction will fail.

Getting PuTTY

If you use windows but not PuTTY you can download it from the following site: http://

You may also be interested in the following:


  • Hunt down other useful options to extract
  • Implement output formats with arguments
  • Support for reading PuTTY settings file (not in registry)
  • Tidy up dirty dirty PowerShell


Export PuTTY SSH/Telnet settings stored in the registry and parse them as connections strings.



No releases published


No packages published
You can’t perform that action at this time.