Modules: Resolve many Rubocop violations

This commit is contained in:
Brendan Coles
2022-01-22 12:46:42 +00:00
parent bbe805f017
commit a64480dfab
317 changed files with 3238 additions and 3965 deletions

View File

@@ -4,27 +4,25 @@
# See the file 'doc/COPYING' for copying permission
#
class Browser_autopwn < BeEF::Core::Command
def self.options
@conf = BeEF::Core::Configuration.instance
@uri = 'Enter AutoPwn URL Here'
def self.options
@conf = BeEF::Core::Configuration.instance
@uri = 'Enter AutoPwn URL Here'
begin
if @conf.get('beef.extension.metasploit.enable')
host = @conf.get('beef.extension.metasploit.callback_host')
url = @conf.get('beef.extension.metasploit.autopwn_url')
@uri = "http://#{host}:8080/#{url}"
end
end
return [
{ 'name' => 'sploit_url', 'description' => 'The URL to exploit', 'ui_label' => 'Listener URL', 'value' => @uri, 'width'=>'200px' },
]
if @conf.get('beef.extension.metasploit.enable')
host = @conf.get('beef.extension.metasploit.callback_host')
url = @conf.get('beef.extension.metasploit.autopwn_url')
@uri = "http://#{host}:8080/#{url}"
end
[
{ 'name' => 'sploit_url', 'description' => 'The URL to exploit', 'ui_label' => 'Listener URL', 'value' => @uri, 'width' => '200px' }
]
end
# This method is being called when a hooked browser sends some
# data back to the framework.
#
def post_execute
save({'result' => @datastore['result']})
save({ 'result' => @datastore['result'] })
end
end