g0tmi1k
b8d80d87f1
Remove last newline after class - Make @wvu-r7 happy
2017-07-19 11:19:49 +01:00
g0tmi1k
4720d1a31e
OCD fixes - Spaces
2017-07-14 08:46:59 +01:00
g0tmi1k
fd843f364b
Removed extra lines
2017-07-14 08:17:16 +01:00
William Vu
64452de06d
Fix msf/core and self.class msftidy warnings
...
Also fixed rex requires.
2017-05-03 15:44:51 -05:00
Christian Mehlmauer
3123175ac7
use MetasploitModule as a class name
2016-03-08 14:02:44 +01:00
Brent Cook
f703fa21d6
Revert "change Metasploit3 class names"
...
This reverts commit 666ae14259
.
2016-03-07 13:19:55 -06:00
Christian Mehlmauer
666ae14259
change Metasploit3 class names
2016-03-07 09:56:58 +01:00
Brent Cook
3d1861b3f4
Land #6526 , integrate {peer} string into logging by default
2016-02-15 15:19:26 -06:00
James Lee
8094eb631b
Do the same for aux modules
2016-02-01 16:06:34 -06:00
Tod Beardsley
86c025de25
Title and description fixes for #6470
2016-01-27 16:40:06 -06:00
kfr-ma
3d04f405b4
Update telisca_ips_lock_control.rb
...
commit the changes mad by sinn3r and replace headers on lock and unlock
2016-01-15 15:05:24 +00:00
wchen-r7
477dc64e1e
Rename module
2016-01-14 19:45:00 -06:00
wchen-r7
eb6cff77bc
Update the code to today's standards
...
Mainly making sure it is following the Ruby style guide, and
avoid unrecommended coding practices.
2016-01-14 19:38:59 -06:00
kfr-ma
46f06516ad
Update /telisca_ips_lock_abuse
...
cleaning the code
2016-01-14 11:13:10 +00:00
Fakhir Karim Reda
60ef1eae90
adding modules/auxiliary/voip/telisca_ips_lock_abuse.rb
2016-01-14 00:00:04 +00:00
Fakhir Karim Reda
1b9563b82a
rm modules/auxiliary/voip/telisca_ips_lock_abuse
2016-01-13 23:09:35 +00:00
Fakhir Karim Reda
457e569f3b
replacing telisca-ips-lock
2016-01-13 22:50:58 +00:00
wchen-r7
8bead5fde2
Modate update on using metasploit-credential
...
Update some more modules to usethe new cred API.
Also, make sure to always provide proof because that seems handy.
2015-07-23 18:07:19 -05:00
wchen-r7
0b88e86a49
Using the new cred API for multiple auxiliary modules
2015-06-15 16:06:57 -05:00
Tod Beardsley
6532fad579
Remove credits to Alligator Security Team
...
All but one of these modules credits both a team name and individual
team members. We should just be crediting team members. The domain
persists in all the other credits.
The one that didn't was credited to dflah_ specifically, so merely
changed the author name.
Longer description, if needed, wrapped at 72 characters.
[See #5012 ]
2015-04-02 15:12:22 -05:00
Tod Beardsley
bae19405a7
Various grammar, spelling, word choice fixes
2015-01-26 11:00:07 -06:00
jvazquez-r7
05d364180b
Beautify descriptions
2015-01-10 01:10:08 -06:00
jvazquez-r7
a2d479a894
Refactor run method
2015-01-10 01:06:56 -06:00
jvazquez-r7
cf9d7d583e
Do first code cleanup
2015-01-10 00:51:31 -06:00
jvazquez-r7
000d7dd1eb
Minor beautification
2015-01-10 00:32:10 -06:00
jvazquez-r7
1d0e9a2dca
Use snake_case filename
2015-01-10 00:29:28 -06:00
jvazquez-r7
070e833d46
Use snake_case filename
2015-01-10 00:28:01 -06:00
jvazquez-r7
59d602f37d
Refactor cisco_cucdm_callforward
2015-01-10 00:27:31 -06:00
jvazquez-r7
511a7f8cca
send_request_cgi already URI encodes
2015-01-10 00:06:26 -06:00
jvazquez-r7
5d8167dca6
Beautify description
2015-01-10 00:02:42 -06:00
jvazquez-r7
9fb4cfb442
Do First callforward cleanup
2015-01-10 00:00:27 -06:00
Fatih Ozavci
d91ffa893b
Viproy is removed from names
...
Author sections are fixed
2014-11-05 15:44:32 +11:00
Fatih Ozavci
329b9ac292
Actions updates of the Viproy CUCDM exploits
2014-10-28 14:11:07 +11:00
Fatih Ozavci
703393e9f1
First revision of the Viproy CUCDM exploits
2014-10-28 13:53:13 +11:00
Fatih Ozavci
1db09fee01
Viproy VoIP Pen-Test Kit - Cisco CUCDM Exploits
2014-10-24 11:46:52 +11:00
URI Assassin
35d3bbf74d
Fix up comment splats with the correct URI
...
See the complaint on #4039 . This doesn't fix that particular
issue (it's somewhat unrelated), but does solve around
a file parsing problem reported by @void-in
2014-10-17 11:47:33 -05:00
Tod Beardsley
ba2c52c5de
Fixed up some more weird splat formatting.
2013-10-16 16:25:48 -05:00
Tod Beardsley
23d058067a
Redo the boilerplate / splat
...
[SeeRM #8496 ]
2013-10-15 13:51:57 -05:00
Tab Assassin
41e4375e43
Retab modules
2013-08-30 16:28:54 -05:00
jvazquez-r7
6ccceedcb7
final cleanup for sip_deregister
2012-11-27 18:34:31 +01:00
jvazquez-r7
496fb63fad
Merge branch 'sip_deregister' of https://github.com/ChrisJohnRiley/metasploit-framework into ChrisJohnRiley-sip_deregister
2012-11-27 18:34:05 +01:00
Chris John Riley
6482de44e4
Added checks for Extension and Domain
...
Altered error handling on no response
2012-11-10 13:21:41 +01:00
Chris John Riley
08d56e31e1
recreated in new branch
...
removed space at EOL
2012-11-08 22:38:21 +01:00
Chris John Riley
b75ade746c
Removed EOL spaces
...
Removed unrequired udp_sock.close
2012-11-08 22:26:37 +01:00
Chris John Riley
da6bf29699
Display message when no response received
2012-11-08 11:59:13 +01:00
Chris John Riley
fc03fbe881
Initial sip_deregister.rb
2012-11-07 13:35:33 +01:00
sinn3r
38518478bd
Format/msftidy fixes
2012-11-02 11:24:34 -05:00
Chris John Riley
891ad4685c
$Id and $Revision
2012-11-02 11:24:34 -05:00
Chris John Riley
954ccf1ca1
Added ability to set extension on target
2012-11-02 11:24:33 -05:00
sinn3r
b282901b08
Correct emails for aux and exploit modules
2012-06-04 21:58:01 -05:00