Skip to content

Commit 97095ab

Browse files
author
Brent Cook
committed
Land rapid7#8338, Fix msf/core and self.class msftidy warnings
2 parents 4dd0471 + 64452de commit 97095ab

File tree

3,186 files changed

+2140
-7875
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,186 files changed

+2140
-7875
lines changed

modules/auxiliary/admin/2wire/xslt_password_reset.rb

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
86
class MetasploitModule < Msf::Auxiliary
97

108
include Msf::Exploit::Remote::HttpClient
@@ -35,7 +33,7 @@ def initialize(info={})
3533
register_options(
3634
[
3735
OptString.new('PASSWORD', [ true, 'The password to reset to', 'admin'])
38-
], self.class)
36+
])
3937
end
4038

4139
def run

modules/auxiliary/admin/android/google_play_store_uxss_xframe_rce.rb

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
86
class MetasploitModule < Msf::Auxiliary
97

108
include Msf::Exploit::Remote::HttpServer::HTML
@@ -61,7 +59,7 @@ def initialize(info = {})
6159
OptBool.new('HIDE_IFRAME', [
6260
true, "Hide the exploit iframe from the user", true
6361
])
64-
], self.class)
62+
])
6563
end
6664

6765
def on_request_uri(cli, request)

modules/auxiliary/admin/appletv/appletv_display_image.rb

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
86
class MetasploitModule < Msf::Auxiliary
97

108
include Msf::Exploit::Remote::HttpClient
@@ -37,7 +35,7 @@ def initialize(info = {})
3735
OptInt.new('TIME', [true, 'Time in seconds to show the image', 10]),
3836
OptPath.new('FILE', [true, 'Image to upload and show']),
3937
OptString.new('HttpPassword', [false, 'The password for AppleTV AirPlay'])
40-
], self.class)
38+
])
4139

4240
# We're not actually using any of these against AppleTV in our Rex HTTP client init,
4341
# so deregister them so we don't overwhelm the user with fake options.

modules/auxiliary/admin/appletv/appletv_display_video.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
76
require 'uri'
87

98
class MetasploitModule < Msf::Auxiliary
@@ -42,7 +41,7 @@ def initialize(info = {})
4241
OptInt.new('TIME', [true, 'Time in seconds to show the video', 60]),
4342
OptString.new('URL', [true, 'URL of video to show. Must use an IP address']),
4443
OptString.new('HttpPassword', [false, 'The password for AppleTV AirPlay'])
45-
], self.class)
44+
])
4645

4746
# We're not actually using any of these against AppleTV in our Rex HTTP client init,
4847
# so deregister them so we don't overwhelm the user with fake options.

modules/auxiliary/admin/atg/atg_client.rb

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,6 @@
44
# Current source: https://github.com/rapid7/metasploit-framework
55
##
66

7-
require 'msf/core'
8-
97
class MetasploitModule < Msf::Auxiliary
108
include Msf::Auxiliary::Report
119
include Msf::Exploit::Remote::Tcp

modules/auxiliary/admin/aws/aws_launch_instances.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
76
require 'metasploit/framework/aws/client'
87

98
class MetasploitModule < Msf::Auxiliary

modules/auxiliary/admin/backupexec/dump.rb

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,6 @@
44
##
55

66

7-
require 'msf/core'
8-
97

108
class MetasploitModule < Msf::Auxiliary
119

@@ -67,7 +65,7 @@ def initialize(info = {})
6765
"backupexec_dump.mtf"
6866
]
6967
),
70-
], self.class)
68+
])
7169
end
7270

7371
def run

modules/auxiliary/admin/backupexec/registry.rb

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,6 @@
44
##
55

66

7-
require 'msf/core'
8-
97

108
class MetasploitModule < Msf::Auxiliary
119

@@ -48,7 +46,7 @@ def initialize(info = {})
4846
"Compromised by Metasploit!\r\n"
4947
]
5048
),
51-
], self.class)
49+
])
5250
end
5351

5452
def auxiliary_commands

modules/auxiliary/admin/chromecast/chromecast_reset.rb

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
86
class MetasploitModule < Msf::Auxiliary
97

108
include Msf::Exploit::Remote::HttpClient
@@ -30,7 +28,7 @@ def initialize(info = {})
3028

3129
register_options([
3230
Opt::RPORT(8008)
33-
], self.class)
31+
])
3432
end
3533

3634
def run

modules/auxiliary/admin/chromecast/chromecast_youtube.rb

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
7-
86
class MetasploitModule < Msf::Auxiliary
97

108
include Msf::Exploit::Remote::HttpClient
@@ -30,7 +28,7 @@ def initialize(info = {})
3028
register_options([
3129
Opt::RPORT(8008),
3230
OptString.new('VID', [true, 'Video ID', 'kxopViU98Xo'])
33-
], self.class)
31+
])
3432
end
3533

3634
def run

0 commit comments

Comments
 (0)