diff --git a/modules/browser/get_visited_domains/config.yaml b/modules/browser/get_visited_domains/config.yaml
index dfcab7cf8..ee2921948 100644
--- a/modules/browser/get_visited_domains/config.yaml
+++ b/modules/browser/get_visited_domains/config.yaml
@@ -22,5 +22,5 @@ beef:
description: "This module will retrieve rapid history extraction through non-destructive cache timing.\nBased on work done at http://lcamtuf.coredump.cx/cachetime/"
authors: ["keith_lee @keith55 http://milo2012.wordpress.com"]
target:
- working: ["FF","IE"]
- not_working: ["O","C","S"]
+ working: ["FF", "IE"]
+ not_working: ["O", "C", "S"]
diff --git a/modules/browser/hooked_domain/ajax_fingerprint/config.yaml b/modules/browser/hooked_domain/ajax_fingerprint/config.yaml
index fb4f54fc8..8216f7223 100644
--- a/modules/browser/hooked_domain/ajax_fingerprint/config.yaml
+++ b/modules/browser/hooked_domain/ajax_fingerprint/config.yaml
@@ -17,11 +17,11 @@ beef:
module:
ajax_fingerprint:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Fingerprint Ajax"
description: "Fingerprint Ajax and JS libraries present on the hooked page."
authors: ["qswain"]
target:
- working: ["FF","S"]
+ working: ["FF", "S"]
not_working: ["C"]
diff --git a/modules/browser/hooked_domain/alert_dialog/config.yaml b/modules/browser/hooked_domain/alert_dialog/config.yaml
index a5572a41d..2b9c05a1b 100644
--- a/modules/browser/hooked_domain/alert_dialog/config.yaml
+++ b/modules/browser/hooked_domain/alert_dialog/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
alert_dialog:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Create Alert Dialog"
description: "Sends an alert dialog to the hooked browser."
authors: ["wade", "bm"]
diff --git a/modules/browser/hooked_domain/deface_web_page/config.yaml b/modules/browser/hooked_domain/deface_web_page/config.yaml
index 22e8fdd4d..8d57a6cfe 100644
--- a/modules/browser/hooked_domain/deface_web_page/config.yaml
+++ b/modules/browser/hooked_domain/deface_web_page/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
deface_web_page:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Replace Content (Deface)"
description: "Overwrite the page, title and shortcut icon on the hooked page."
authors: ["antisnatchor"]
diff --git a/modules/browser/hooked_domain/get_cookie/config.yaml b/modules/browser/hooked_domain/get_cookie/config.yaml
index b535101ef..a5670e31e 100644
--- a/modules/browser/hooked_domain/get_cookie/config.yaml
+++ b/modules/browser/hooked_domain/get_cookie/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
get_cookie:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Get Cookie"
description: "This module will retrieve the session cookie from the current page."
authors: ["bcoles"]
diff --git a/modules/browser/hooked_domain/get_local_storage/config.yaml b/modules/browser/hooked_domain/get_local_storage/config.yaml
index 2d6d5a011..f008244b3 100644
--- a/modules/browser/hooked_domain/get_local_storage/config.yaml
+++ b/modules/browser/hooked_domain/get_local_storage/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
get_local_storage:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Get Local Storage"
description: "Extracts data from the HTML5 localStorage object."
authors: ["bcoles"]
diff --git a/modules/browser/hooked_domain/get_page_html/config.yaml b/modules/browser/hooked_domain/get_page_html/config.yaml
index 77e2e9109..a4e51a376 100644
--- a/modules/browser/hooked_domain/get_page_html/config.yaml
+++ b/modules/browser/hooked_domain/get_page_html/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
get_page_html:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Get Page HTML"
description: "This module will retrieve the HTML from the current page."
authors: ["bcoles"]
diff --git a/modules/browser/hooked_domain/get_page_links/config.yaml b/modules/browser/hooked_domain/get_page_links/config.yaml
index fd0422e2e..1b1ed13f3 100644
--- a/modules/browser/hooked_domain/get_page_links/config.yaml
+++ b/modules/browser/hooked_domain/get_page_links/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
get_page_links:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Get Page HREFs"
description: "This module will retrieve HREFs from the target page."
authors: ["vo"]
diff --git a/modules/browser/hooked_domain/get_session_storage/config.yaml b/modules/browser/hooked_domain/get_session_storage/config.yaml
index 417d52853..39d1cff08 100644
--- a/modules/browser/hooked_domain/get_session_storage/config.yaml
+++ b/modules/browser/hooked_domain/get_session_storage/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
get_session_storage:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Get Session Storage"
description: "Extracts data from the HTML5 sessionStorage object."
authors: ["bcoles"]
diff --git a/modules/browser/hooked_domain/get_stored_credentials/config.yaml b/modules/browser/hooked_domain/get_stored_credentials/config.yaml
index ad865fbc1..1c01a0391 100644
--- a/modules/browser/hooked_domain/get_stored_credentials/config.yaml
+++ b/modules/browser/hooked_domain/get_stored_credentials/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
get_stored_credentials:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Get Stored Credentials"
description: "This module retrieves saved username/password combinations from the login page on the hooked domain.
It will fail if more than one set of domain credentials are saved in the browser."
authors: ["bcoles"]
diff --git a/modules/browser/hooked_domain/link_rewrite/config.yaml b/modules/browser/hooked_domain/link_rewrite/config.yaml
index a2420dcae..f458eb1e0 100644
--- a/modules/browser/hooked_domain/link_rewrite/config.yaml
+++ b/modules/browser/hooked_domain/link_rewrite/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
link_rewrite:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Replace HREFs"
description: "This module will rewrite all the href attributes of all matched links."
authors: ["passbe"]
diff --git a/modules/browser/hooked_domain/link_rewrite_sslstrip/config.yaml b/modules/browser/hooked_domain/link_rewrite_sslstrip/config.yaml
index ab5dbbee4..176ec2f69 100644
--- a/modules/browser/hooked_domain/link_rewrite_sslstrip/config.yaml
+++ b/modules/browser/hooked_domain/link_rewrite_sslstrip/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
link_rewrite_sslstrip:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Replace HREFs (HTTPS)"
description: "This module will rewrite all the href attributes of HTTPS links to use HTTP instead of HTTPS. Links relative to the web root are not rewritten."
authors: ["bcoles"]
diff --git a/modules/browser/hooked_domain/mobilesafari_address_spoofing/config.yaml b/modules/browser/hooked_domain/mobilesafari_address_spoofing/config.yaml
index 163bf3056..b4a20fe33 100644
--- a/modules/browser/hooked_domain/mobilesafari_address_spoofing/config.yaml
+++ b/modules/browser/hooked_domain/mobilesafari_address_spoofing/config.yaml
@@ -17,10 +17,10 @@ beef:
module:
mobilesafari_address_spoofing:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "iOS Address Bar Spoofing"
description: "Mobile Safari iOS 5.1 Address Bar Spoofing. This is fixed in latest version of Mobile Safari (the URL turns 'blank')"
- authors: ["bcoles","xntrik","majorsecurity.net"]
+ authors: ["bcoles", "xntrik", "majorsecurity.net"]
target:
working:
S:
diff --git a/modules/browser/hooked_domain/prompt_dialog/config.yaml b/modules/browser/hooked_domain/prompt_dialog/config.yaml
index 8b3f21ac4..0f9035279 100644
--- a/modules/browser/hooked_domain/prompt_dialog/config.yaml
+++ b/modules/browser/hooked_domain/prompt_dialog/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
prompt_dialog:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Create Prompt Dialog"
description: "Sends a prompt dialog to the hooked browser."
authors: ["wade", "bm"]
diff --git a/modules/browser/hooked_domain/replace_video/config.yaml b/modules/browser/hooked_domain/replace_video/config.yaml
index 9fb293c7e..f8ddbcda0 100644
--- a/modules/browser/hooked_domain/replace_video/config.yaml
+++ b/modules/browser/hooked_domain/replace_video/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
replace_video:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Replace Videos"
description: "Replaces an object selected with jQuery (all embed tags by default) with an embed tag containing the youtube video of your choice (rickroll by default)."
authors: ["Yori Kvitchko", "antisnatchor"]
diff --git a/modules/browser/hooked_domain/rickroll/config.yaml b/modules/browser/hooked_domain/rickroll/config.yaml
index d8014fcc2..f86c183fa 100644
--- a/modules/browser/hooked_domain/rickroll/config.yaml
+++ b/modules/browser/hooked_domain/rickroll/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
rickroll:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Redirect Browser (Rickroll)"
description: "Overwrite the body of the page the victim is on with a full screen Rickroll."
authors: ["Yori Kvitchko"]
diff --git a/modules/browser/hooked_domain/site_redirect/config.yaml b/modules/browser/hooked_domain/site_redirect/config.yaml
index 306c3e7a2..3c9681e0a 100644
--- a/modules/browser/hooked_domain/site_redirect/config.yaml
+++ b/modules/browser/hooked_domain/site_redirect/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
site_redirect:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Redirect Browser"
description: "This module will redirect the selected hooked browser to the address specified in the 'Redirect URL' input."
authors: ["wade", "vo"]
diff --git a/modules/browser/hooked_domain/site_redirect_iframe/config.yaml b/modules/browser/hooked_domain/site_redirect_iframe/config.yaml
index 9e5d349c3..ad73b2efe 100644
--- a/modules/browser/hooked_domain/site_redirect_iframe/config.yaml
+++ b/modules/browser/hooked_domain/site_redirect_iframe/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
site_redirect_iframe:
enable: true
- category: ["Browser","Hooked Domain"]
+ category: ["Browser", "Hooked Domain"]
name: "Redirect Browser (iFrame)"
description: "This module creates a 100% x 100% overlaying iframe and keeps the browers hooked to the framework. The content of the iframe, page title, page shortcut icon and the time delay are specified in the parameters below.
The content of the URL bar will not be changed in the hooked browser."
authors: ["ethicalhack3r", "Yori Kvitchko"]
diff --git a/modules/exploits/camera/dlink_dcs_series_csrf/config.yaml b/modules/exploits/camera/dlink_dcs_series_csrf/config.yaml
index 2920b7a84..af3d4a3f0 100644
--- a/modules/exploits/camera/dlink_dcs_series_csrf/config.yaml
+++ b/modules/exploits/camera/dlink_dcs_series_csrf/config.yaml
@@ -19,7 +19,7 @@ beef:
module:
Dlink_dcs_series_csrf:
enable: true
- category: ["Exploits","Camera"]
+ category: ["Exploits", "Camera"]
name: "Dlink DCS series CSRF"
description: "Attempts to change the password on a Dlink DCS series camera."
authors: ["bcoles"]
diff --git a/modules/exploits/glassfish_war_upload_xsrf/config.yaml b/modules/exploits/glassfish_war_upload_xsrf/config.yaml
index c065be089..b92c453c9 100644
--- a/modules/exploits/glassfish_war_upload_xsrf/config.yaml
+++ b/modules/exploits/glassfish_war_upload_xsrf/config.yaml
@@ -22,4 +22,4 @@ beef:
description: "This module attempts to deploy a malicious war file on an Oracle GlassFish Server 3.1.1 (build 12). It makes advantage of a CSRF bug in the REST interface.
For more information refer to http://blog.malerisch.net/2012/04/oracle-glassfish-server-rest-csrf.html."
authors: ["Bart Leppens"]
target:
- working: ["FF","S","C"]
+ working: ["FF", "S", "C"]
diff --git a/modules/exploits/router/bt_home_hub_csrf/config.yaml b/modules/exploits/router/bt_home_hub_csrf/config.yaml
index 022045eb9..39034eba7 100644
--- a/modules/exploits/router/bt_home_hub_csrf/config.yaml
+++ b/modules/exploits/router/bt_home_hub_csrf/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
bt_home_hub_csrf:
enable: true
- category: ["Exploits","Router"]
+ category: ["Exploits", "Router"]
name: "BT Home Hub CSRF"
description: "Attempts to enable remote administration and change the tech password on a BT Home Hub wireless router."
authors: ["bcoles"]
diff --git a/modules/exploits/router/comtrend_ct5367_csrf/config.yaml b/modules/exploits/router/comtrend_ct5367_csrf/config.yaml
index b502288f1..c579a47b9 100644
--- a/modules/exploits/router/comtrend_ct5367_csrf/config.yaml
+++ b/modules/exploits/router/comtrend_ct5367_csrf/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
comtrend_ct5367_csrf:
enable: true
- category: ["Exploits","Router"]
+ category: ["Exploits", "Router"]
name: "Comtrend CT-5367 CSRF"
description: "Attempts to enable remote administration and change the password on a Comtrend CT-5367 router."
authors: ["bcoles"]
diff --git a/modules/exploits/router/comtrend_ct5624_csrf/config.yaml b/modules/exploits/router/comtrend_ct5624_csrf/config.yaml
index fe71d96bf..27f47c06e 100644
--- a/modules/exploits/router/comtrend_ct5624_csrf/config.yaml
+++ b/modules/exploits/router/comtrend_ct5624_csrf/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
comtrend_ct5624_csrf:
enable: true
- category: ["Exploits","Router"]
+ category: ["Exploits", "Router"]
name: "Comtrend CT-5624 CSRF"
description: "Attempts to enable remote administration and change the password on a Comtrend CT-5624 router."
authors: ["bcoles"]
diff --git a/modules/exploits/router/dlink_dsl500t_csrf/config.yaml b/modules/exploits/router/dlink_dsl500t_csrf/config.yaml
index aab56869a..d7e6ace24 100644
--- a/modules/exploits/router/dlink_dsl500t_csrf/config.yaml
+++ b/modules/exploits/router/dlink_dsl500t_csrf/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
dlink_dsl500t_csrf:
enable: true
- category: ["Exploits","Router"]
+ category: ["Exploits", "Router"]
name: "D-Link DSL500T CSRF"
description: "Attempts to change the password on a D-Link DSL500T router."
authors: ["bcoles"]
diff --git a/modules/exploits/router/huawei_smartax_mt880/config.yaml b/modules/exploits/router/huawei_smartax_mt880/config.yaml
index 0ccbe8c1d..d12a65130 100644
--- a/modules/exploits/router/huawei_smartax_mt880/config.yaml
+++ b/modules/exploits/router/huawei_smartax_mt880/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
Huawei_smartax_mt880_csrf:
enable: true
- category: ["Exploits","Router"]
+ category: ["Exploits", "Router"]
name: "Huawei SmartAX MT880 CSRF"
description: "Attempts to add an administrator account on a Huawei SmartAX MT880 router."
authors: ["bcoles"]
diff --git a/modules/exploits/router/linksys_befsr41_csrf/config.yaml b/modules/exploits/router/linksys_befsr41_csrf/config.yaml
index 790045b2f..d3308de95 100644
--- a/modules/exploits/router/linksys_befsr41_csrf/config.yaml
+++ b/modules/exploits/router/linksys_befsr41_csrf/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
linksys_befsr41_csrf:
enable: true
- category: ["Exploits","Router"]
+ category: ["Exploits", "Router"]
name: "Linksys BEFSR41 CSRF"
description: "Attempts to enable remote administration and change the password on a Linksys BEFSR41 router."
authors: ["Martin Barbella"]
diff --git a/modules/exploits/router/linksys_wrt54g2_csrf/config.yaml b/modules/exploits/router/linksys_wrt54g2_csrf/config.yaml
index de9c1162d..a64dd89fd 100644
--- a/modules/exploits/router/linksys_wrt54g2_csrf/config.yaml
+++ b/modules/exploits/router/linksys_wrt54g2_csrf/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
linksys_wrt54g2_csrf:
enable: true
- category: ["Exploits","Router"]
+ category: ["Exploits", "Router"]
name: "Linksys WRT54G2 CSRF"
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G2 router."
authors: ["Martin Barbella"]
diff --git a/modules/exploits/router/linksys_wrt54g_csrf/config.yaml b/modules/exploits/router/linksys_wrt54g_csrf/config.yaml
index a85f8d5f4..4129d26e1 100644
--- a/modules/exploits/router/linksys_wrt54g_csrf/config.yaml
+++ b/modules/exploits/router/linksys_wrt54g_csrf/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
linksys_wrt54g_csrf:
enable: true
- category: ["Exploits","Router"]
+ category: ["Exploits", "Router"]
name: "Linksys WRT54G CSRF"
description: "Attempts to enable remote administration and change the password on a Linksys WRT54G router."
authors: ["Martin Barbella"]
diff --git a/modules/exploits/switch/netgear_gs108t_csrf/config.yaml b/modules/exploits/switch/netgear_gs108t_csrf/config.yaml
index 42798a2d3..6402686d4 100644
--- a/modules/exploits/switch/netgear_gs108t_csrf/config.yaml
+++ b/modules/exploits/switch/netgear_gs108t_csrf/config.yaml
@@ -17,7 +17,7 @@ beef:
module:
Netgear_gs108t_csrf:
enable: true
- category: ["Exploits","Switch"]
+ category: ["Exploits", "Switch"]
name: "Netgear GS108T CSRF"
description: "Attempts to change the password on a Netgear GS108T managed switch."
authors: ["Bart Leppens"]