Updates Python shebangs to Python 3

This commit is contained in:
cgranleese-r7
2021-05-17 17:04:49 +01:00
parent a32d9116da
commit a894b8cc29
12 changed files with 18 additions and 17 deletions
+1 -1
View File
@@ -186,7 +186,7 @@ class Msf::Modules::External::PyBridge < Msf::Modules::External::Bridge
def handle_exception(error)
case error
when Errno::ENOENT
LoadError.new('Failed to execute external Python module. Please ensure you have Python installed on your environment.')
LoadError.new('Failed to execute external Python module. Please ensure you have Python3 installed on your environment.')
else
super
end
@@ -1,4 +1,4 @@
#!/usr/bin/env python
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
#2018-05-09 14-15
+1 -2
View File
@@ -1,5 +1,4 @@
#!/usr/bin/env python
# Note, works with both python 2.7 and 3
#!/usr/bin/env python3
import random
import socket
+1 -2
View File
@@ -1,6 +1,5 @@
#!/usr/bin/env python
#!/usr/bin/env python3
# -*- coding: utf-8 -
# Note, works with both python 2.7 and 3
import socket
+1 -1
View File
@@ -1,4 +1,4 @@
#!/usr/bin/env python
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
import sys
@@ -1,4 +1,4 @@
#!/usr/bin/env python
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# 2019-03-27 05-55
@@ -1,4 +1,4 @@
#!/usr/bin/env python
#!/usr/bin/env python3
# Copyright (c) 2003-2018 CORE Security Technologies
#
# This software is provided under under a slightly modified version
@@ -301,7 +301,7 @@ def run(args):
return
_msf_impacket.pre_run_hook(args)
executer = DCOMEXEC(args['COMMAND'], args['SMBUser'], args['SMBPass'], args['SMBDomain'],
executer = DCOMEXEC(args['COMMAND'], args['SMBUser'], args['SMBPass'], args['SMBDomain'],
share='ADMIN$', noOutput=args['OUTPUT'] != 'true', dcomObject=args['OBJECT'])
executer.run(args['rhost'])
@@ -1,4 +1,4 @@
#!/usr/bin/env python
#!/usr/bin/env python3
# Copyright (c) 2003-2018 CORE Security Technologies
#
# This software is provided under under a slightly modified version
@@ -101,7 +101,7 @@ class DumpSecrets:
self.__canProcessSAMLSA = True
self.__kdcHost = None
self.__execMethod = execMethod
def connect(self):
self.__smbConnection = SMBConnection(self.__remoteName, self.__remoteHost)
@@ -1,4 +1,4 @@
#!/usr/bin/env python
#!/usr/bin/env python3
# Copyright (c) 2003-2018 CORE Security Technologies
#
# This software is provided under under a slightly modified version
@@ -118,7 +118,7 @@ class RemoteShell(_msf_impacket.RemoteShell):
super(RemoteShell, self).__init__(share, smbConnection)
def execute_remote(self, data):
command = self._shell + data
command = self._shell + data
if self._noOutput is False:
command += ' 1> ' + '\\\\127.0.0.1\\%s' % self._share + self._output + ' 2>&1'
self.__win32Process.Create(command.decode('utf-8'), self._pwd, None)
@@ -131,7 +131,7 @@ def run(args):
return
_msf_impacket.pre_run_hook(args)
executer = WMIEXEC(args['COMMAND'], args['SMBUser'], args['SMBPass'], args['SMBDomain'],
executer = WMIEXEC(args['COMMAND'], args['SMBUser'], args['SMBPass'], args['SMBDomain'],
share='ADMIN$', noOutput=args['OUTPUT'] != 'true')
executer.run(args['rhost'])
@@ -1,4 +1,4 @@
#!/usr/bin/env python
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
#2018-05-29 08-49
+1 -1
View File
@@ -1,4 +1,4 @@
#!/usr/bin/env python
#!/usr/bin/env python3
# Vendor Homepage: https://haraka.github.io/
# Software Link: https://github.com/haraka/Haraka
+3
View File
@@ -1,4 +1,7 @@
#!/usr/bin/env python2
# Note: This module explicitly requires Python2 as KillerBee does not yet support Python3:
# https://github.com/riverloopsec/killerbee/tree/cb04e169a635ad4bc0772b631e1b332320f7a8da#killerbee
# KillerBee Metasploit relay server
import re