Permalink
Browse files

msftidy: Remove $Revision$

  • Loading branch information...
1 parent 25aaf7a commit 8f2dd8e2ced5434def8c19f9e6695129c9cfb05f @FireFart FireFart committed Jan 3, 2013
Showing 1,142 changed files with 0 additions and 1,147 deletions.
@@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder
def initialize
super(
'Name' => 'Generic Shell Variable Substitution Command Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This encoder uses standard Bourne shell variable substitution
tricks to avoid commonly restricted characters.
@@ -18,7 +18,6 @@ class Metasploit3 < Msf::Encoder
def initialize
super(
'Name' => 'Generic ${IFS} Substitution Command Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This encoder uses standard Bourne shell variable substitution
to avoid spaces without being overly fancy.
@@ -23,7 +23,6 @@ class Metasploit3 < Msf::Encoder
def initialize
super(
'Name' => 'printf(1) via PHP magic_quotes Utility Command Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This encoder uses the printf(1) utility to avoid restricted
characters. Some shell variable substituion may also be used
@@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder
def initialize
super(
'Name' => 'The "none" Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This "encoder" does not transform the payload in any way.
},
@@ -15,7 +15,6 @@ class Metasploit3 < Msf::Encoder::Xor
def initialize
super(
'Name' => 'XOR Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
Mips Web server exploit friendly xor encoder
},
@@ -15,7 +15,6 @@ class Metasploit3 < Msf::Encoder::Xor
def initialize
super(
'Name' => 'XOR Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
Mips Web server exploit friendly xor encoder
},
@@ -15,7 +15,6 @@ class Metasploit3 < Msf::Encoder
def initialize
super(
'Name' => 'PHP Base64 Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This encoder returns a base64 string encapsulated in
eval(base64_decode()), increasing the size by a bit more than
@@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Xor
def initialize
super(
'Name' => 'PPC LongXOR Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This encoder is ghandi's PPC dword xor encoder with some size tweaks
by HDM.
@@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Xor
def initialize
super(
'Name' => 'PPC LongXOR Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This encoder is ghandi's PPC dword xor encoder but uses a tag-based
terminator rather than a length.
@@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback
def initialize
super(
'Name' => 'SPARC DWORD XOR Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This encoder is optyx's 48-byte SPARC encoder with some tweaks.
},
@@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Xor
def initialize
super(
'Name' => 'XOR Encoder',
- 'Version' => '$Revision$',
'Description' => 'An x64 XOR encoder. Uses an 8 byte key and takes advantage of x64 relative addressing.',
'Author' => [ 'sf' ],
'Arch' => ARCH_X86_64,
@@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Alphanum
def initialize
super(
'Name' => "Alpha2 Alphanumeric Mixedcase Encoder",
- 'Version' => '$Revision$',
'Description' => %q{
Encodes payloads as alphanumeric mixedcase text. This encoder uses
SkyLined's Alpha2 encoding suite.
@@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder::Alphanum
def initialize
super(
'Name' => "Alpha2 Alphanumeric Uppercase Encoder",
- 'Version' => '$Revision$',
'Description' => %q{
Encodes payloads as alphanumeric uppercase text. This encoder uses
SkyLined's Alpha2 encoding suite.
@@ -24,7 +24,6 @@ class Metasploit3 < Msf::Encoder
def initialize
super(
'Name' => 'Avoid underscore/tolower',
- 'Version' => '$Revision$',
'Description' => %q{
Underscore/tolower Safe Encoder used to exploit CVE-2012-2329. It is a
modified version of the 'Avoid UTF8/tolower' encoder by skape. Please check
@@ -113,7 +113,6 @@ def to_s
def initialize
super(
'Name' => 'Avoid UTF8/tolower',
- 'Version' => '$Revision$',
'Description' => 'UTF8 Safe, tolower Safe Encoder',
'Author' => 'skape',
'Arch' => ARCH_X86,
@@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Xor
def initialize
super(
'Name' => 'Call+4 Dword XOR Encoder',
- 'Version' => '$Revision$',
'Description' => 'Call+4 Dword XOR Encoder',
'Author' => [ 'hdm', 'spoonm' ],
'Arch' => ARCH_X86,
@@ -18,7 +18,6 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback
def initialize
super(
'Name' => 'CPUID-based Context Keyed Payload Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This is a Context-Keyed Payload Encoder based on CPUID and Shikata Ga Nai.
},
@@ -18,7 +18,6 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback
def initialize
super(
'Name' => 'stat(2)-based Context Keyed Payload Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This is a Context-Keyed Payload Encoder based on stat(2)
and Shikata Ga Nai.
@@ -18,7 +18,6 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback
def initialize
super(
'Name' => 'time(2)-based Context Keyed Payload Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This is a Context-Keyed Payload Encoder based on time(2)
and Shikata Ga Nai.
@@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Xor
def initialize
super(
'Name' => 'Single-byte XOR Countdown Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This encoder uses the length of the payload as a position-dependent
encoder key to produce a small decoder stub.
@@ -14,7 +14,6 @@ class Metasploit3 < Msf::Encoder::Xor
def initialize
super(
'Name' => 'Variable-length Fnstenv/mov Dword XOR Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This encoder uses a variable-length mov equivalent instruction
with fnstenv for getip.
@@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback
def initialize
super(
'Name' => 'Jump/Call XOR Additive Feedback Encoder',
- 'Version' => '$Revision$',
'Description' => 'Jump/Call XOR Additive Feedback',
'Author' => 'skape',
'Arch' => ARCH_X86,
@@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder::NonAlpha
def initialize
super(
'Name' => "Non-Alpha Encoder",
- 'Version' => '$Revision$',
'Description' => %q{
Encodes payloads as non-alpha based bytes. This allows
payloads to bypass both toupper() and tolower() calls,
@@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder::NonUpper
def initialize
super(
'Name' => "Non-Upper Encoder",
- 'Version' => '$Revision$',
'Description' => %q{
Encodes payloads as non-alpha based bytes. This allows
payloads to bypass tolower() calls, but will fail isalpha().
@@ -19,7 +19,6 @@ class Metasploit3 < Msf::Encoder::XorAdditiveFeedback
def initialize
super(
'Name' => 'Polymorphic XOR Additive Feedback Encoder',
- 'Version' => '$Revision$',
'Description' => %q{
This encoder implements a polymorphic XOR additive feedback encoder.
The decoder stub is generated based on dynamic instruction
@@ -24,7 +24,6 @@ class Metasploit3 < Msf::Encoder
def initialize
super(
'Name' => 'Single Static Bit',
- 'Version' => '$Revision$',
'Description' => 'Static value for specific bit',
'Author' => 'jduck',
'Arch' => ARCH_X86,
@@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder::Alphanum
def initialize
super(
'Name' => "Alpha2 Alphanumeric Unicode Mixedcase Encoder",
- 'Version' => '$Revision$',
'Description' => %q{
Encodes payloads as unicode-safe mixedcase text. This encoder uses
SkyLined's Alpha2 encoding suite.
@@ -17,7 +17,6 @@ class Metasploit3 < Msf::Encoder::Alphanum
def initialize
super(
'Name' => "Alpha2 Alphanumeric Unicode Uppercase Encoder",
- 'Version' => '$Revision$',
'Description' => %q{
Encodes payload as unicode-safe uppercase text. This encoder uses
SkyLined's Alpha2 encoding suite.
@@ -32,7 +32,6 @@ def initialize(info = {})
'Rodrigo Rubira Branco (BSDaemon)',
'jduck',
],
- 'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2009-3699' ],
@@ -26,7 +26,6 @@ def initialize(info = {})
'Ramon de C Valle',
'Adriano Lima <adriano[at]risesecurity.org>',
],
- 'Version' => '$Revision$',
'Platform' => [ 'aix' ],
'References' =>
[
@@ -26,7 +26,6 @@ def initialize(info = {})
},
'License' => MSF_LICENSE,
'Author' => ['hdm', 'kf'],
- 'Version' => '$Revision$',
'References' =>
[
['CVE', '2006-3459'],
@@ -26,7 +26,6 @@ def initialize(info = {})
},
'License' => MSF_LICENSE,
'Author' => ['hdm', 'kf'],
- 'Version' => '$Revision$',
'References' =>
[
['CVE', '2006-3459'],
@@ -27,7 +27,6 @@ def initialize(info = {})
4.00b.
},
'Author' => [ 'skape', 'trew' ],
- 'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-2221'],
@@ -29,7 +29,6 @@ def initialize(info = {})
[ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2002-10/0014.html'],
[ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2004-12/0404.html'],
],
- 'Version' => '$Revision$',
'Author' =>
[
'I)ruid',
@@ -23,7 +23,6 @@ def initialize(info = {})
execute arbitrary code.
},
'Author' => [ 'jduck' ],
- 'Version' => '$Revision$',
'References' =>
[
['CVE', '2010-4221'],
@@ -24,7 +24,6 @@ def initialize(info = {})
},
'Author' => [ 'hdm', 'jduck' ],
'License' => MSF_LICENSE,
- 'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2003-0201' ],
@@ -22,7 +22,6 @@ def initialize(info = {})
username, an attacker may be able to execute arbitrary code.
},
'Author' => 'MC',
- 'Version' => '$Revision$',
'References' =>
[
['CVE', '2008-7232'],
@@ -28,7 +28,6 @@ def initialize(info = {})
HPSBUX0208-213.
},
'Author' => [ 'hdm' ],
- 'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2002-1473'],
@@ -21,7 +21,6 @@ def initialize(info = {})
},
'Author' => [ 'optyx', 'hdm' ],
'License' => MSF_LICENSE,
- 'Version' => '$Revision$',
'References' =>
[
['CVE', '2001-0800'],
@@ -52,7 +52,6 @@ def initialize(info = {})
'Evgeny Legerov <admin [at] gleg.net>', # original .pm version (VulnDisco)
'jduck' # Metasploit 3.x port
],
- 'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2006-5815' ],
@@ -43,7 +43,6 @@ def initialize(info = {})
and could allow exploitation in semi-reasonable amount of time.
},
'Author' => [ 'jduck' ],
- 'Version' => '$Revision$',
'References' =>
[
['CVE', '2010-4221'],
@@ -31,7 +31,6 @@ def initialize(info = {})
},
'Author' => [ 'onetwo' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-0608'],
@@ -27,7 +27,6 @@ module only supports command line payloads, as the httpd process kills
},
'Author' => [ 'patrick' ],
'License' => MSF_LICENSE,
- 'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '40521' ],
@@ -25,7 +25,6 @@ def initialize(info = {})
},
'Author' => [ 'gat3way', 'hdm' ],
'License' => MSF_LICENSE,
- 'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2009-2765' ],
@@ -21,7 +21,6 @@ def initialize(info = {})
},
'Author' => [ 'Yann Senotier <yann.senotier [at] cyber-networks.fr>' ],
'License' => MSF_LICENSE,
- 'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-1388' ],
@@ -22,7 +22,6 @@ def initialize(info = {})
},
'Author' => [ 'Raphael Rigo <devel-metasploit[at]syscall.eu>', 'Julien Tinnes <julien[at]cr0.org>' ],
'License' => MSF_LICENSE,
- 'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2005-2799'],
@@ -22,7 +22,6 @@ def initialize(info = {})
},
'Author' => [ 'MC' ],
'License' => BSD_LICENSE,
- 'Version' => '$Revision$',
'References' =>
[
['CVE', '2006-1148'],
@@ -30,7 +30,6 @@ def initialize(info = {})
},
'Author' => [ 'patrick' ],
'License' => MSF_LICENSE,
- 'Version' => '$Revision$',
'References' =>
[
# Default password
@@ -32,7 +32,6 @@ def initialize(info = {})
[ 'EDB', '17487' ],
[ 'URL', 'http://www.webidsupport.com/forums/showthread.php?3892' ]
],
- 'Version' => '$Revision$',
'Privileged' => false,
'Platform' => ['php'],
'Arch' => ARCH_PHP,
@@ -33,7 +33,6 @@ def initialize(info = {})
'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit
],
'License' => MSF_LICENSE,
- 'Version' => '$Revision$',
'Privileged' => false,
'Arch' => ARCH_CMD,
'Platform' => 'unix',
Oops, something went wrong.

0 comments on commit 8f2dd8e

Please sign in to comment.