Showing 4,113 of 21,757 total issues
File vcenter_secrets_dump.rb
has 798 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'metasploit/framework/credential_collection'
class MetasploitModule < Msf::Post
include Msf::Post::Common
include Msf::Post::File
File base.rb
has 788 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class Msf::Exploit::Remote::Kerberos::ServiceAuthenticator::Base
extend Forwardable
include Msf::Exploit::Remote::Kerberos::Client
include Msf::Auxiliary::Report
include Rex::Proto::Gss::Asn1
File exploit.rb
has 785 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
module Msf
###
Method cmd_sessions
has 361 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def cmd_sessions(*args)
begin
method = nil
quiet = false
show_active = false
File browser_autopwn.rb
has 756 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'rex/exploitation/js/detect'
require 'rex/exploitation/jsobfu'
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpServer::HTML
File file.rb
has 755 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'rex/post/meterpreter/extensions/stdapi/command_ids'
require 'rex/post/file_stat'
module Msf::Post::File
include Msf::Post::Common
File snmp_enum.rb
has 749 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::SNMPClient
include Msf::Auxiliary::Report
include Msf::Auxiliary::Scanner
File mssql_enum.rb
has 734 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::MSSQL
include Msf::Auxiliary::Report
include Msf::OptionalSession::MSSQL
Method sql_statement
has 340 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def sql_statement()
# DEFINED HEADER TEXT
headings = [
["Server","Database", "Schema", "Table", "Column", "Data Type", "Sample Data","Row Count"]
File ssllabs_scan.rb
has 732 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'active_support/inflector'
require 'json'
require 'active_support/core_ext/hash'
class MetasploitModule < Msf::Auxiliary
File readable_text.rb
has 731 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
module Msf
module Serializer
# This class formats information in a plain-text format that
# is meant to be displayed on a console or some other non-GUI
File weblogic_deserialize_badattrval.rb
has 728 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::CmdStager
File veeam_credential_dump.rb
has 724 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'metasploit/framework/credential_collection'
class MetasploitModule < Msf::Post
include Msf::Post::Common
include Msf::Post::File
Method on_request_uri
has 334 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
print_status("Sending #{request.uri}")
if request.uri =~ %r{/exploit.html$}
html = %Q^
<html>
Class Core
has 88 methods (exceeds 20 allowed). Consider refactoring. Open
Open
class Core
include Msf::Ui::Console::CommandDispatcher
include Msf::Ui::Console::CommandDispatcher::Common
include Msf::Ui::Console::ModuleOptionTabCompletion
File java_jdwp_debugger.rb
has 718 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class MetasploitModule < Msf::Exploit::Remote
Rank = GoodRanking
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::EXE
Method exploit
has 329 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
if target.name =~ /prestashop/
uri = normalize_uri(target_uri.path)
res = send_request_cgi({'uri' => uri})
if res && res.code != 301
Method exploit
has 326 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
if is_root?
fail_with Failure::BadConfig, 'Session already has root privileges'
end
Method cisco_ios_config_eater
has 324 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def cisco_ios_config_eater(thost, tport, config)
if framework.db.active
credential_data = {
address: thost,
Method on_request_uri
has 323 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
user_agent = request['User-Agent']
print_status("Request from #{user_agent}")
offsets = get_offsets(user_agent)
unless offsets