Skip to content

Commit

Permalink
Remove requires that sneaked in while the PR was up
Browse files Browse the repository at this point in the history
  • Loading branch information
dwelch-r7 committed Dec 7, 2020
1 parent 1617b3e commit 49a6b1b
Show file tree
Hide file tree
Showing 11 changed files with 0 additions and 24 deletions.
2 changes: 0 additions & 2 deletions lib/msf/core/payload/windows/x64/addr_loader.rb
@@ -1,7 +1,5 @@
# -*- coding: binary -*-

require 'msf/core'

module Msf

###
Expand Down
2 changes: 0 additions & 2 deletions modules/auxiliary/admin/networking/vyos_config.rb
Expand Up @@ -3,8 +3,6 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core/auxiliary/vyos'

class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::VYOS

Expand Down
2 changes: 0 additions & 2 deletions modules/exploits/multi/browser/chrome_object_create.rb
Expand Up @@ -3,8 +3,6 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core/payload/windows/x64/addr_loader'

class MetasploitModule < Msf::Exploit::Remote
Rank = ManualRanking

Expand Down
4 changes: 0 additions & 4 deletions modules/exploits/windows/local/cve_2019_1458_wizardopium.rb
Expand Up @@ -3,10 +3,6 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core/post/file'
require 'msf/core/exploit/exe'
require 'msf/core/post/windows/priv'

class MetasploitModule < Msf::Exploit::Local
Rank = NormalRanking

Expand Down
Expand Up @@ -3,12 +3,6 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core/post/common'
require 'msf/core/post/file'
require 'msf/core/post/windows/priv'
require 'msf/core/exploit/exe'
require 'msf/core/post/windows/registry'

class MetasploitModule < Msf::Exploit::Local
Rank = ExcellentRanking

Expand Down
1 change: 0 additions & 1 deletion modules/payloads/singles/python/shell_reverse_tcp.rb
Expand Up @@ -5,7 +5,6 @@

require 'msf/base/sessions/command_shell'
require 'msf/base/sessions/command_shell_options'
require 'msf/core/payload/python'

module MetasploitModule

Expand Down
1 change: 0 additions & 1 deletion modules/payloads/singles/python/shell_reverse_tcp_ssl.rb
Expand Up @@ -5,7 +5,6 @@

require 'msf/base/sessions/command_shell'
require 'msf/base/sessions/command_shell_options'
require 'msf/core/payload/python'

module MetasploitModule

Expand Down
1 change: 0 additions & 1 deletion modules/payloads/singles/python/shell_reverse_udp.rb
Expand Up @@ -5,7 +5,6 @@

require 'msf/base/sessions/command_shell'
require 'msf/base/sessions/command_shell_options'
require 'msf/core/payload/python'

module MetasploitModule

Expand Down
2 changes: 0 additions & 2 deletions modules/post/networking/gather/enum_vyos.rb
Expand Up @@ -3,8 +3,6 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core/auxiliary/vyos'

class MetasploitModule < Msf::Post
include Msf::Auxiliary::VYOS

Expand Down
2 changes: 0 additions & 2 deletions spec/lib/msf/core/auxiliary/vyos_spec.rb
Expand Up @@ -2,8 +2,6 @@

require 'spec_helper'

require 'msf/core/auxiliary/vyos'

RSpec.describe Msf::Auxiliary::VYOS do
class DummyVYOSClass
include Msf::Auxiliary::VYOS
Expand Down
1 change: 0 additions & 1 deletion spec/lib/msf/core/exploit/remote/auto_check_spec.rb
@@ -1,5 +1,4 @@
require 'spec_helper'
require 'msf/core/exploit'

RSpec.shared_examples "An AutoCheck module which can be overridden" do |opts|
context "When the check method returns #{opts[:check_code]}", focus: opts[:focus] do
Expand Down

0 comments on commit 49a6b1b

Please sign in to comment.