diff --git a/extensions/evasion/config.yaml b/extensions/evasion/config.yaml index b708a9ecb..c75031da8 100644 --- a/extensions/evasion/config.yaml +++ b/extensions/evasion/config.yaml @@ -25,4 +25,4 @@ beef: beef: "beef" Beef: "Beef" evercookie: "evercookie" - chain: ["scramble","minify","base_64"] \ No newline at end of file + chain: ["scramble", "minify", "base_64"] diff --git a/modules/exploits/router/dlink_dir_615_wipe_passwd/config.yaml b/modules/exploits/router/dlink_dir_615_wipe_passwd/config.yaml index 28e9b7bf0..e1e22073f 100644 --- a/modules/exploits/router/dlink_dir_615_wipe_passwd/config.yaml +++ b/modules/exploits/router/dlink_dir_615_wipe_passwd/config.yaml @@ -20,6 +20,6 @@ beef: category: ["Exploits", "Router"] name: "D-Link DIR-615 Password Wipe" description: "Attempts to wipe the password of the admin user on a D-Link DIR-615 router. Enable also remote administration on 0.0.0.0:8080" - authors: ["antisnatchor","n0x00"] + authors: ["antisnatchor", "n0x00"] target: working: ["ALL"]