diff --git a/modules/exploits/shell_shock_scanner/config.yaml b/modules/exploits/shell_shock_scanner/config.yaml
index be4b5fc61..06b6c3ac9 100644
--- a/modules/exploits/shell_shock_scanner/config.yaml
+++ b/modules/exploits/shell_shock_scanner/config.yaml
@@ -10,6 +10,6 @@ beef:
category: "Exploits"
name: "Shell Shock Scanner (Reverse Shell)"
description: "This module attempts to get a reverse shell on the specified web server, blindly, by requesting ~400 potentially vulnerable CGI scripts. Each CGI is requested with a shellshock payload in the 'Accept' HTTP header.
The list of CGI scripts was taken from Shocker."
- authors: ["Stephane Chazelas", "mz", "bmantra", "bcoles"]
+ authors: ["Stephane Chazelas", "mz", "bmantra", "radoen", "bcoles"]
target:
working: ["ALL"]
diff --git a/modules/exploits/shell_shocked/config.yaml b/modules/exploits/shell_shocked/config.yaml
index df3edd907..18cd7c1c5 100644
--- a/modules/exploits/shell_shocked/config.yaml
+++ b/modules/exploits/shell_shocked/config.yaml
@@ -10,5 +10,6 @@ beef:
category: "Exploits"
name: "Shell Shock"
description: "Attempt to use vulnerability CVE-2014-627 to execute arbitrary code. The default command attempts to get a reverse shell.
Note: Set the LHOST and LPORT."
+ authors: ["Stephane Chazelas", "mz", "radoen", "bcoles"]
target:
working: ["All"]