Commit 71c02001 by fwkz

Unifying keys in exploits metadata dict.

parent c730eeeb
...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit): ...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit):
""" """
__info__ = { __info__ = {
'name': 'FTP Bruteforce', 'name': 'FTP Bruteforce',
'author': [ 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
] ]
} }
......
...@@ -22,7 +22,7 @@ class Exploit(exploits.Exploit): ...@@ -22,7 +22,7 @@ class Exploit(exploits.Exploit):
""" """
__info__ = { __info__ = {
'name': 'FTP Default Creds', 'name': 'FTP Default Creds',
'author': [ 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
] ]
} }
......
...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit): ...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit):
""" """
__info__ = { __info__ = {
'name': 'HTTP Basic Bruteforce', 'name': 'HTTP Basic Bruteforce',
'author': [ 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
] ]
} }
......
...@@ -22,7 +22,7 @@ class Exploit(exploits.Exploit): ...@@ -22,7 +22,7 @@ class Exploit(exploits.Exploit):
""" """
__info__ = { __info__ = {
'name': 'HTTP Basic Default Creds', 'name': 'HTTP Basic Default Creds',
'author': [ 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
] ]
} }
......
...@@ -24,7 +24,7 @@ class Exploit(exploits.Exploit): ...@@ -24,7 +24,7 @@ class Exploit(exploits.Exploit):
""" """
__info__ = { __info__ = {
'name': 'HTTP Form Bruteforce', 'name': 'HTTP Form Bruteforce',
'author': [ 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
] ]
} }
......
...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit): ...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit):
""" """
__info__ = { __info__ = {
'name': 'HTTP Form Default Creds', 'name': 'HTTP Form Default Creds',
'author': [ 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
] ]
} }
......
...@@ -21,7 +21,7 @@ class Exploit(exploits.Exploit): ...@@ -21,7 +21,7 @@ class Exploit(exploits.Exploit):
""" """
__info__ = { __info__ = {
'name': 'SNMP Bruteforce', 'name': 'SNMP Bruteforce',
'author': 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'authors': 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit): ...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit):
""" """
__info__ = { __info__ = {
'name': 'SSH Bruteforce', 'name': 'SSH Bruteforce',
'author': 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'authors': 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -22,7 +22,7 @@ class Exploit(exploits.Exploit): ...@@ -22,7 +22,7 @@ class Exploit(exploits.Exploit):
""" """
__info__ = { __info__ = {
'name': 'SSH Default Creds', 'name': 'SSH Default Creds',
'author': [ 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
] ]
} }
......
...@@ -22,7 +22,7 @@ class Exploit(exploits.Exploit): ...@@ -22,7 +22,7 @@ class Exploit(exploits.Exploit):
""" """
__info__ = { __info__ = {
'name': 'Telnet Bruteforce', 'name': 'Telnet Bruteforce',
'author': 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'authors': 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -21,7 +21,7 @@ class Exploit(exploits.Exploit): ...@@ -21,7 +21,7 @@ class Exploit(exploits.Exploit):
""" """
__info__ = { __info__ = {
'name': 'Telnet Default Creds', 'name': 'Telnet Default Creds',
'author': [ 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
] ]
} }
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment