Permalink
Browse files

Removing trailing whitespaces (PEP8)

  • Loading branch information...
1 parent 82b4682 commit 5b77b20e2e2d6026a070a03903a5abfe76079ea9 @stamparm stamparm committed Jan 3, 2013
@@ -365,7 +365,7 @@ def start():
# a warning message to the user in case the page is not stable
checkStability()
- # Do a little prioritization reorder of a testable parameter list
+ # Do a little prioritization reorder of a testable parameter list
parameters = conf.parameters.keys()
# Order of testing list (last to first)
View
@@ -24,7 +24,7 @@ class SORT_ORDER:
class DBMS:
ACCESS = "Microsoft Access"
- DB2 = "IBM DB2"
+ DB2 = "IBM DB2"
FIREBIRD = "Firebird"
MAXDB = "SAP MaxDB"
MSSQL = "Microsoft SQL Server"
View
@@ -34,7 +34,7 @@ def blockingReadFromFD(fd):
# Uncomment the following line if the process seems to
# take a huge amount of cpu time
# time.sleep(0.01)
- continue
+ continue
else:
raise
break
@@ -52,9 +52,9 @@ def blockingWriteToFD(fd, data):
wrote_data = os.write(fd, data)
except (OSError, IOError), io:
if io.errno in (errno.EAGAIN, errno.EINTR):
- continue
+ continue
else:
- raise
+ raise
if wrote_data < data_length:
blockingWriteToFD(fd, data[wrote_data:])
@@ -17,8 +17,8 @@ class HTTPRangeHandler(urllib2.BaseHandler):
Reference: http://stackoverflow.com/questions/1971240/python-seek-on-remote-file
This was extremely simple. The Range header is a HTTP feature to
- begin with so all this class does is tell urllib2 that the
- "206 Partial Content" response from the HTTP server is what we
+ begin with so all this class does is tell urllib2 that the
+ "206 Partial Content" response from the HTTP server is what we
expected.
Example:
@@ -11,7 +11,7 @@
class Enumeration(GenericEnumeration):
def __init__(self):
- GenericEnumeration.__init__(self)
+ GenericEnumeration.__init__(self)
def getPasswordHashes(self):
warnMsg = "on DB2 it is not possible to list password hashes"
@@ -261,22 +261,22 @@ def _stackedWriteFileVbs(self, tmpPath, wFileContent, dFile, fileType):
Set file = fs.GetFile(inputFilePath)
If file.Size Then
Wscript.Echo "Loading from: " & inputFilePath
- Wscript.Echo
+ Wscript.Echo
Set fd = fs.OpenTextFile(inputFilePath, 1)
data = fd.ReadAll
fd.Close
data = Replace(data, " ", "")
data = Replace(data, vbCr, "")
data = Replace(data, vbLf, "")
- Wscript.Echo "Fixed Input: "
+ Wscript.Echo "Fixed Input: "
Wscript.Echo data
- Wscript.Echo
+ Wscript.Echo
decodedData = base64_decode(data)
- Wscript.Echo "Output: "
+ Wscript.Echo "Output: "
Wscript.Echo decodedData
- Wscript.Echo
+ Wscript.Echo
Wscript.Echo "Writing output in: " & outputFilePath
- Wscript.Echo
+ Wscript.Echo
Set ofs = CreateObject("Scripting.FileSystemObject").OpenTextFile(outputFilePath, 2, True)
ofs.Write decodedData
ofs.close
View
@@ -22,7 +22,7 @@ def tamper(payload, **kwargs):
Example:
* Input: UNION SELECT
- * Output: UNION SELECT
+ * Output: UNION SELECT
Notes:
* Useful to bypass very weak and bespoke web application firewalls
View
@@ -51,7 +51,7 @@ def process(match):
else:
return match.group()
- retVal = ""
+ retVal = ""
if payload:
payload = re.sub(r"(?<=\W)(?P<word>[A-Za-z_]+)(?=\W|\Z)", lambda match: process(match), payload)
View
@@ -42,16 +42,16 @@ def tamper(payload, **kwargs):
# STX 02 start of text
# ETX 03 end of text
# EOT 04 end of transmission
- # ENQ 05 enquiry
- # ACK 06 acknowledge
+ # ENQ 05 enquiry
+ # ACK 06 acknowledge
# BEL 07 bell
# BS 08 backspace
# TAB 09 horizontal tab
# LF 0A new line
- # VT 0B vertical TAB
- # FF 0C new page
- # CR 0D carriage return
- # SO 0E shift out
+ # VT 0B vertical TAB
+ # FF 0C new page
+ # CR 0D carriage return
+ # SO 0E shift out
# SI 0F shift in
blanks = ('%01', '%02', '%03', '%04', '%05', '%06', '%07', '%08', '%09', '%0B', '%0C', '%0D', '%0E', '%0F', '%0A')
retVal = payload
@@ -82,7 +82,7 @@ def tamper(payload, **kwargs):
else:
retVal += random.choice(blanks)
- continue
+ continue
retVal += payload[i]

0 comments on commit 5b77b20

Please sign in to comment.