clean up modules to assist in testing

This commit is contained in:
Stephen
2024-04-14 11:04:18 +10:00
parent 1699a1dcde
commit 213cd721d6
9 changed files with 9 additions and 9 deletions

View File

@@ -8,7 +8,7 @@ beef:
get_visited_urls:
enable: true
category: "Browser"
name: "Get Visited URLs"
name: "Get Visited URLs (Old Browsers)"
description: "This module will detect whether or not the hooked browser has visited the specified URL(s)"
authors: ["passbe"]
target:

View File

@@ -8,7 +8,7 @@ beef:
site_redirect:
enable: true
category: ["Browser", "Hooked Domain"]
name: "Redirect Browser"
name: "Redirect Browser (Standard)"
description: "This module will redirect the selected hooked browser to the address specified in the 'Redirect URL' input."
authors: ["wade", "vo"]
target:

View File

@@ -8,7 +8,7 @@ beef:
Shell_shocked:
enable: true
category: "Exploits"
name: "Shell Shock"
name: "Shell Shock (CVE-2014-6271)"
description: "Attempt to use vulnerability CVE-2014-627 to execute arbitrary code. The default command attempts to get a reverse shell.<br/>Note: Set the LHOST and LPORT."
authors: ["Stephane Chazelas", "mz", "radoen"]
target:

View File

@@ -8,7 +8,7 @@ beef:
physical_location:
enable: true
category: "Host"
name: "Get Geolocation"
name: "Get Geolocation (API)"
description: "This module will retrieve the physical location of the hooked browser using the geolocation API."
authors: ["antisnatchor"]
target:

View File

@@ -9,7 +9,7 @@ beef:
enable: true
category: "Network"
name: "Fetch Port Scanner"
description: " Uses fetch to test the response in order to determine if a port is open or not"
description: "Uses fetch to test the response in order to determine if a port is open or not"
authors: ["Crimes by Will", "jcrew99", "salmong1t"]
# http://caniuse.com/cors
target:

View File

@@ -8,7 +8,7 @@ beef:
ping_sweep:
enable: true
category: "Network"
name: "Ping Sweep"
name: "Ping Sweep (JS XHR)"
description: "Discover active hosts in the internal network of the hooked browser using JavaScript XHR.<br/><br/>Note: set the IP address range to 'common' to scan a list of common LAN addresses."
authors: ["bcoles"]
target:

View File

@@ -6,7 +6,7 @@
beef:
module:
ping_sweep_java:
enable: true
enable: false
category: "Network"
name: "Ping Sweep (Java)"
description: "Discover active hosts in the internal network of the hooked browser. Same logic of the Ping Sweep module, but using an unsigned Java applet to work in browsers other than Firefox.<br> For Firefox, use the normal PingSweep module."

View File

@@ -8,7 +8,7 @@ beef:
port_scanner:
enable: true
category: "Network"
name: "Port Scanner"
name: "Port Scanner (Multiple Methods)"
description: "Scan ports in a given hostname, using WebSockets, CORS and img tags. It uses the three methods to avoid blocked ports or Same Origin Policy.<br/><br/>Note: The user may see authentication popups in the event any of the target ports are web servers using HTTP authentication."
authors: ["javier.marcos"]
target:

View File

@@ -10,7 +10,7 @@ beef:
phonegap_persistence:
enable: true
category: "Phonegap"
name: "Persistence"
name: "Persistence (PhoneGap)"
description: "Insert the BeEF hook into PhoneGap's index.html (iPhone only). This module requires the PhoneGap API."
authors: ["mh"]
target: