Showing 4,139 of 21,886 total issues
File android.rb
has 637 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'rex/post/meterpreter'
require 'rex/post/meterpreter/extensions/android/command_ids'
require 'date'
module Rex
File uds.rb
has 636 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
module Msf
class Post
module Hardware
module Automotive
Method on_request_uri
has 280 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
print_status("Request from #{request['User-Agent']}")
if request.uri =~ %r{/loader32$}
print_good("armle target is vulnerable.")
local_file = File.join( Msf::Config.data_directory, "exploits", "CVE-2016-4655", "exploit32" )
Class EXE
has 74 methods (exceeds 20 allowed). Consider refactoring. Open
Open
class EXE
require 'rex'
require 'rex/peparsey'
require 'rex/pescan'
Class Modules
has 74 methods (exceeds 20 allowed). Consider refactoring. Open
Open
class Modules
include Msf::Ui::Console::CommandDispatcher
include Msf::Ui::Console::CommandDispatcher::Common
File packet.rb
has 624 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'openssl'
require 'rex/post/meterpreter/command_mapper'
module Rex
module Post
File oraenum.rb
has 621 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Report
include Msf::Exploit::ORACLE
def initialize(info = {})
Method exploit
has 272 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
if !datastore['ForceExploit'] && is_root?
fail_with(Failure::BadConfig, 'Session already has root privileges. Set ForceExploit to override.')
end
File whatsupgold_credential_dump.rb
has 614 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'metasploit/framework/credential_collection'
class MetasploitModule < Msf::Post
include Msf::Post::Common
include Msf::Post::File
Method apply_prepends
has 267 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def apply_prepends(buf)
pre = ''
app = ''
test_arch = [ *(self.arch) ]
File dns.rb
has 611 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
module Msf
module Ui
module Console
module CommandDispatcher
Class Db
has 70 methods (exceeds 20 allowed). Consider refactoring. Open
Open
class Db
require 'tempfile'
include Msf::Ui::Console::CommandDispatcher
File vim_soap.rb
has 597 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
module Msf
module Exploit::Remote::VIMSoap
include Msf::Exploit::Remote::HttpClient
File auth_brute.rb
has 595 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
module Msf
###
#
# This module provides methods for brute forcing authentication
File utils.rb
has 587 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
module Rex::Proto::NTLM
class Utils
# duplicate from lib/rex/proto/smb/utils cause we only need this function from Rex::Proto::SMB::Utils
# Convert a unix timestamp to a 64-bit signed server time
File http_client.rb
has 587 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'uri'
require 'digest'
module Msf
Method on_request_uri
has 252 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
print_status("Sending #{request.uri} to #{request['User-Agent']}")
escaped_payload = Rex::Text.to_unescape(payload.raw)
jscript = %Q^
var shellcode = unescape("#{escaped_payload}");
File crushftp_rce_cve_2023_43177.rb
has 585 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::FileDropper
Method on_request_uri
has 249 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_request_uri(cli, request)
print_status("Sending #{request.uri} to #{request['User-Agent']}")
download_payload = ''
shellcode = payload.encoded
uripath = datastore['URIPATH'] || get_resource
File cloud_lookup.rb
has 580 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'public_suffix'
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::DNS::Enumeration
include Msf::Auxiliary::Report