Name |
Last commit
|
Last update |
---|---|---|
.travis | ||
routersploit | ||
tests | ||
.dockerignore | ||
.gitignore | ||
.travis.yml | ||
CONTRIBUTING.md | ||
Dockerfile | ||
LICENSE | ||
Makefile | ||
README.md | ||
requirements-dev.txt | ||
requirements.txt | ||
rsf.py |
Introduce `Exploit.validate_setup` method in order to check whether Exploit's setup is correct. In most case scanarios we will check if `Exploit.target` is not `None`. When exploit need custom validation logic please overwrite `validate_setup`.
Name |
Last commit
|
Last update |
---|---|---|
.travis | Loading commit data... | |
routersploit | Loading commit data... | |
tests | Loading commit data... | |
.dockerignore | Loading commit data... | |
.gitignore | Loading commit data... | |
.travis.yml | Loading commit data... | |
CONTRIBUTING.md | Loading commit data... | |
Dockerfile | Loading commit data... | |
LICENSE | Loading commit data... | |
Makefile | Loading commit data... | |
README.md | Loading commit data... | |
requirements-dev.txt | Loading commit data... | |
requirements.txt | Loading commit data... | |
rsf.py | Loading commit data... |