Showing 4,139 of 21,886 total issues
Method asm_reverse_http
has 323 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def asm_reverse_http(opts={})
retry_count = opts[:retry_count].to_i
retry_wait = opts[:retry_wait].to_i * 1000
proxy_enabled = !!(opts[:proxy_host].to_s.strip.length > 0)
File lastpass_creds.rb
has 697 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'English'
require 'sqlite3'
require 'uri'
class MetasploitModule < Msf::Post
Method asm_reverse_http
has 316 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def asm_reverse_http(opts={})
retry_count = opts[:retry_count].to_i
retry_wait = opts[:retry_wait].to_i * 1000
proxy_enabled = !!(opts[:proxy_host].to_s.strip.length > 0)
File fs.rb
has 691 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'tempfile'
require 'filesize'
require 'rex/post/meterpreter'
require 'rex/post/meterpreter/extensions/stdapi/command_ids'
require 'msf/ui/console/local_file_system'
Method build_payload_obj
has 312 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def build_payload_obj(payload_data)
payload_obj = 'aced' # STREAM_MAGIC
payload_obj << '0005' # STREAM_VERSION
payload_obj << '7372' # TC_OBJECT, TC_CLASSDESC
payload_obj << '002e' # Class name length: 46
File rbmysql.rb
has 686 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class RbMysql
require "rbmysql/constants"
require "rbmysql/error"
require "rbmysql/charset"
File msftidy.rb
has 680 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'fileutils'
require 'find'
require 'time'
require 'rubocop'
require 'open3'
Method run_host
has 307 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_host(ip)
begin
res = send_request_raw({
'uri' => '/oradb/PUBLIC/GLOBAL_NAME',
File teamcity_agent_xmlrpc_exec.rb
has 673 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::CmdStager
File windows_error.rb
has 673 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
module Msf
class WindowsError
#
Method on_request_uri
has 303 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
if request.uri =~ %r{/screenshot$}
data = ''
if supports_espia?(session)
data = session.espia.espia_image_get_dev_screen
File openssl_heartbleed.rb
has 659 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::Tcp
include Msf::Auxiliary::Scanner
include Msf::Auxiliary::Report
File ms_dtyp.rb
has 656 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'bindata'
require 'ruby_smb'
require 'rex/proto/secauthz/well_known_sids'
module Rex::Proto::MsDtyp
File resolver.rb
has 654 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'socket'
require 'timeout'
require 'ipaddr'
require 'logger'
require 'net/dns/packet'
File opennms_horizon_authenticated_rce.rb
has 651 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
prepend Msf::Exploit::Remote::AutoCheck
File glassfish_deployer.rb
has 647 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'nokogiri'
require 'metasploit/framework/login_scanner/glassfish'
require 'metasploit/framework/credential_collection'
class MetasploitModule < Msf::Exploit::Remote
Class Exploit
has 77 methods (exceeds 20 allowed). Consider refactoring. Open
Open
class Exploit < Msf::Module
##
# Exceptions
##
File thycotic_secretserver_dump.rb
has 644 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'metasploit/framework/credential_collection'
class MetasploitModule < Msf::Post
include Msf::Post::Common
include Msf::Post::File
Method generate
has 285 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def generate(_opts = {})
target_uri = datastore['URL'] || ""
filename = datastore['EXE'] || ""
proto = "https"
File client.rb
has 639 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'rex/encoder/ndr'
require 'recog'
module Msf
module Exploit::Remote::SMB