Fixes #339. Cleans up author names for the most part - there are still some stragglers, but this should fix up the frequent contributors

git-svn-id: file:///home/svn/framework3/trunk@7173 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2009-10-17 05:55:15 +00:00
parent ce25403e18
commit d3aa513773
7 changed files with 7 additions and 7 deletions

View File

@ -17,7 +17,7 @@ module Payload::Osx::BundleInject
'Description' => 'Inject a custom Mach-O bundle into the exploited process',
'Author' =>
[
'Dino Dai Zovi <ddz@theta44.org>',
'ddz',
],
'License' => MSF_LICENSE,
'Platform' => 'osx',

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
# Metasploit implementation
'natron',
# bl4cksecurity blog explanation of vuln [see References]
'xort & redsand',
'xort', 'redsand',
# obfuscation techniques and pdf template from util_printf
'MC', 'Didier Stevens <didier.stevens[at]gmail.com>',
],

View File

@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' =>
[
'Chris Eagle', # initial discovery
'Johnny Cache <johnnycsh [at] 802.11mercenary.com>', # the man with the plan
'Johnny Cache <johnnycsh [at] 802.11mercenary.net>', # the man with the plan
'skape', # windows kernel ninjitsu and debugging
'hdm' # porting the C version to ruby
],

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
# Metasploit implementation
'natron',
# bl4cksecurity blog explanation of vuln [see References]
'xort & redsand',
'xort', 'redsand',
# obfuscation techniques and pdf template from util_printf
'MC', 'Didier Stevens <didier.stevens[at]gmail.com>',
],

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
header of the web request. MailEnable Enterprise Edition versions priot to 1.0.5 and
MailEnable Professional versions prior to 1.55 are affected.
},
'Author' => 'David Maciejak <david dot maciejak at kyxar dot fr>',
'Author' => 'David Maciejak <david.maciejak[at]kyxar.fr>',
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
reboot.
},
'Author' => [ 'hdm', 'bmc' ],
'Author' => [ 'hdm', 'cazz' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>