diff --git a/modules/auxiliary/admin/2wire/xslt_password_reset.rb b/modules/auxiliary/admin/2wire/xslt_password_reset.rb
index 9cf9cf6fb2..db41cacd26 100644
--- a/modules/auxiliary/admin/2wire/xslt_password_reset.rb
+++ b/modules/auxiliary/admin/2wire/xslt_password_reset.rb
@@ -136,5 +136,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/admin/android/google_play_store_uxss_xframe_rce.rb b/modules/auxiliary/admin/android/google_play_store_uxss_xframe_rce.rb
index 47a0910ecb..4a79999eb5 100644
--- a/modules/auxiliary/admin/android/google_play_store_uxss_xframe_rce.rb
+++ b/modules/auxiliary/admin/android/google_play_store_uxss_xframe_rce.rb
@@ -177,5 +177,4 @@ class MetasploitModule < Msf::Auxiliary
def run
exploit
end
-
end
diff --git a/modules/auxiliary/admin/appletv/appletv_display_video.rb b/modules/auxiliary/admin/appletv/appletv_display_video.rb
index a962253956..86c94a0428 100644
--- a/modules/auxiliary/admin/appletv/appletv_display_video.rb
+++ b/modules/auxiliary/admin/appletv/appletv_display_video.rb
@@ -151,5 +151,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("Video request sent. Duration set: #{datastore['TIME']} seconds")
play_video_uri
end
-
end
diff --git a/modules/auxiliary/admin/backupexec/dump.rb b/modules/auxiliary/admin/backupexec/dump.rb
index 94c03e0d20..40f706639e 100644
--- a/modules/auxiliary/admin/backupexec/dump.rb
+++ b/modules/auxiliary/admin/backupexec/dump.rb
@@ -268,5 +268,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/admin/backupexec/registry.rb b/modules/auxiliary/admin/backupexec/registry.rb
index 446e9d4056..dc2a66489b 100644
--- a/modules/auxiliary/admin/backupexec/registry.rb
+++ b/modules/auxiliary/admin/backupexec/registry.rb
@@ -267,5 +267,4 @@ class MetasploitModule < Msf::Auxiliary
NDR.long(hive)
return stub
end
-
end
diff --git a/modules/auxiliary/admin/chromecast/chromecast_reset.rb b/modules/auxiliary/admin/chromecast/chromecast_reset.rb
index e6257b7223..f26bd9bf1d 100644
--- a/modules/auxiliary/admin/chromecast/chromecast_reset.rb
+++ b/modules/auxiliary/admin/chromecast/chromecast_reset.rb
@@ -78,5 +78,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
end
-
end
diff --git a/modules/auxiliary/admin/chromecast/chromecast_youtube.rb b/modules/auxiliary/admin/chromecast/chromecast_youtube.rb
index 271cd34a8f..daa5293938 100644
--- a/modules/auxiliary/admin/chromecast/chromecast_youtube.rb
+++ b/modules/auxiliary/admin/chromecast/chromecast_youtube.rb
@@ -84,5 +84,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
end
-
end
diff --git a/modules/auxiliary/admin/cisco/cisco_asa_extrabacon.rb b/modules/auxiliary/admin/cisco/cisco_asa_extrabacon.rb
index 90e0726c1f..efe9f7eb23 100644
--- a/modules/auxiliary/admin/cisco/cisco_asa_extrabacon.rb
+++ b/modules/auxiliary/admin/cisco/cisco_asa_extrabacon.rb
@@ -219,5 +219,4 @@ class MetasploitModule < Msf::Auxiliary
ver
end
-
end
diff --git a/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb b/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb
index c745e9767b..77e63d6288 100644
--- a/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb
+++ b/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb
@@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("Deltas: #{deltas.map{|x| "%.8x" % x}.join(", ")}")
end
end
-
end
diff --git a/modules/auxiliary/admin/firetv/firetv_youtube.rb b/modules/auxiliary/admin/firetv/firetv_youtube.rb
index fed418e293..b096c906ef 100644
--- a/modules/auxiliary/admin/firetv/firetv_youtube.rb
+++ b/modules/auxiliary/admin/firetv/firetv_youtube.rb
@@ -83,5 +83,4 @@ class MetasploitModule < Msf::Auxiliary
fail_with(Failure::Unreachable, e)
end
end
-
end
diff --git a/modules/auxiliary/admin/hp/hp_data_protector_cmd.rb b/modules/auxiliary/admin/hp/hp_data_protector_cmd.rb
index 06d80a9c23..9d96658907 100644
--- a/modules/auxiliary/admin/hp/hp_data_protector_cmd.rb
+++ b/modules/auxiliary/admin/hp/hp_data_protector_cmd.rb
@@ -89,5 +89,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
end
-
end
diff --git a/modules/auxiliary/admin/hp/hp_imc_som_create_account.rb b/modules/auxiliary/admin/hp/hp_imc_som_create_account.rb
index f3a2f3a860..1ae4bd5ddb 100644
--- a/modules/auxiliary/admin/hp/hp_imc_som_create_account.rb
+++ b/modules/auxiliary/admin/hp/hp_imc_som_create_account.rb
@@ -268,5 +268,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("Use it to log into #{login_url}")
end
end
-
end
diff --git a/modules/auxiliary/admin/http/axigen_file_access.rb b/modules/auxiliary/admin/http/axigen_file_access.rb
index 13d25cb78f..008f6e9710 100644
--- a/modules/auxiliary/admin/http/axigen_file_access.rb
+++ b/modules/auxiliary/admin/http/axigen_file_access.rb
@@ -172,5 +172,4 @@ class MetasploitModule < Msf::Auxiliary
return false
end
-
end
diff --git a/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb b/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb
index 06ef75e878..f9bc0671a9 100644
--- a/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb
+++ b/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb
@@ -44,5 +44,4 @@ class MetasploitModule < Msf::Auxiliary
'data' => 'obj=Httpd:ExecuteFile(,cmd.exe,/c,' + cmd + ',)'
}, 3)
end
-
end
diff --git a/modules/auxiliary/admin/http/iis_auth_bypass.rb b/modules/auxiliary/admin/http/iis_auth_bypass.rb
index b9749e209f..159e3913c8 100644
--- a/modules/auxiliary/admin/http/iis_auth_bypass.rb
+++ b/modules/auxiliary/admin/http/iis_auth_bypass.rb
@@ -86,5 +86,4 @@ class MetasploitModule < Msf::Auxiliary
print_good("You can bypass auth by doing: #{bypass_string}")
end
end
-
end
diff --git a/modules/auxiliary/admin/http/mutiny_frontend_read_delete.rb b/modules/auxiliary/admin/http/mutiny_frontend_read_delete.rb
index 230cc79874..ac64fc1553 100644
--- a/modules/auxiliary/admin/http/mutiny_frontend_read_delete.rb
+++ b/modules/auxiliary/admin/http/mutiny_frontend_read_delete.rb
@@ -169,5 +169,4 @@ class MetasploitModule < Msf::Auxiliary
return false
end
-
end
diff --git a/modules/auxiliary/admin/http/nexpose_xxe_file_read.rb b/modules/auxiliary/admin/http/nexpose_xxe_file_read.rb
index b0aaf2f618..881035c955 100644
--- a/modules/auxiliary/admin/http/nexpose_xxe_file_read.rb
+++ b/modules/auxiliary/admin/http/nexpose_xxe_file_read.rb
@@ -152,5 +152,4 @@ class MetasploitModule < Msf::Auxiliary
path = store_loot('nexpose.file','text/plain', rhost, doc.root.elements["//host"].first.to_s, "File from Nexpose server #{rhost}")
print_good("File saved to path: " << path)
end
-
end
diff --git a/modules/auxiliary/admin/http/novell_file_reporter_filedelete.rb b/modules/auxiliary/admin/http/novell_file_reporter_filedelete.rb
index 0fc6db6bf1..6ac3f35fda 100644
--- a/modules/auxiliary/admin/http/novell_file_reporter_filedelete.rb
+++ b/modules/auxiliary/admin/http/novell_file_reporter_filedelete.rb
@@ -59,5 +59,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("File not deleted")
end
end
-
end
diff --git a/modules/auxiliary/admin/http/scrutinizer_add_user.rb b/modules/auxiliary/admin/http/scrutinizer_add_user.rb
index c24e4ab5ff..a8e91cf311 100644
--- a/modules/auxiliary/admin/http/scrutinizer_add_user.rb
+++ b/modules/auxiliary/admin/http/scrutinizer_add_user.rb
@@ -81,5 +81,4 @@ class MetasploitModule < Msf::Auxiliary
print_line(res.body)
end
end
-
end
diff --git a/modules/auxiliary/admin/http/sophos_wpa_traversal.rb b/modules/auxiliary/admin/http/sophos_wpa_traversal.rb
index 16e9b94bdd..8c72886410 100644
--- a/modules/auxiliary/admin/http/sophos_wpa_traversal.rb
+++ b/modules/auxiliary/admin/http/sophos_wpa_traversal.rb
@@ -118,5 +118,4 @@ class MetasploitModule < Msf::Auxiliary
print_good("File saved in: #{path}")
end
-
end
diff --git a/modules/auxiliary/admin/http/typo3_sa_2009_001.rb b/modules/auxiliary/admin/http/typo3_sa_2009_001.rb
index 42e4353cf1..39a0732c30 100644
--- a/modules/auxiliary/admin/http/typo3_sa_2009_001.rb
+++ b/modules/auxiliary/admin/http/typo3_sa_2009_001.rb
@@ -146,5 +146,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("#{rhost}:#{rport} [Typo3-SA-2009-001] Failed to retrieve file #{datastore['RFILE']}")
end
-
end
diff --git a/modules/auxiliary/admin/http/typo3_sa_2010_020.rb b/modules/auxiliary/admin/http/typo3_sa_2010_020.rb
index 5bbfc38286..4a05ea1364 100644
--- a/modules/auxiliary/admin/http/typo3_sa_2010_020.rb
+++ b/modules/auxiliary/admin/http/typo3_sa_2010_020.rb
@@ -137,5 +137,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("#{rhost}:#{rport} [Typo3-SA-2010-020] Failed to retrieve file #{datastore['RFILE']}")
end
-
end
diff --git a/modules/auxiliary/admin/http/typo3_winstaller_default_enc_keys.rb b/modules/auxiliary/admin/http/typo3_winstaller_default_enc_keys.rb
index cb1bbf83ac..b3dd313c32 100644
--- a/modules/auxiliary/admin/http/typo3_winstaller_default_enc_keys.rb
+++ b/modules/auxiliary/admin/http/typo3_winstaller_default_enc_keys.rb
@@ -197,5 +197,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("Maybe try checking the ACTIONS - Currently using #{action.name}")
end
-
end
diff --git a/modules/auxiliary/admin/http/wp_custom_contact_forms.rb b/modules/auxiliary/admin/http/wp_custom_contact_forms.rb
index 2010b6ea70..18ce958505 100644
--- a/modules/auxiliary/admin/http/wp_custom_contact_forms.rb
+++ b/modules/auxiliary/admin/http/wp_custom_contact_forms.rb
@@ -104,5 +104,4 @@ class MetasploitModule < Msf::Auxiliary
return
end
end
-
end
diff --git a/modules/auxiliary/admin/maxdb/maxdb_cons_exec.rb b/modules/auxiliary/admin/maxdb/maxdb_cons_exec.rb
index 981dc45b6a..6be7af340d 100644
--- a/modules/auxiliary/admin/maxdb/maxdb_cons_exec.rb
+++ b/modules/auxiliary/admin/maxdb/maxdb_cons_exec.rb
@@ -71,5 +71,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/admin/misc/sercomm_dump_config.rb b/modules/auxiliary/admin/misc/sercomm_dump_config.rb
index 888415734a..4420aa6c6b 100644
--- a/modules/auxiliary/admin/misc/sercomm_dump_config.rb
+++ b/modules/auxiliary/admin/misc/sercomm_dump_config.rb
@@ -257,5 +257,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/admin/mssql/mssql_enum_domain_accounts_sqli.rb b/modules/auxiliary/admin/mssql/mssql_enum_domain_accounts_sqli.rb
index dbddc6c137..aa04239735 100644
--- a/modules/auxiliary/admin/mssql/mssql_enum_domain_accounts_sqli.rb
+++ b/modules/auxiliary/admin/mssql/mssql_enum_domain_accounts_sqli.rb
@@ -216,5 +216,4 @@ class MetasploitModule < Msf::Auxiliary
# Create full sid
"0x#{domain_sid}#{principal_id}"
end
-
end
diff --git a/modules/auxiliary/admin/mssql/mssql_findandsampledata.rb b/modules/auxiliary/admin/mssql/mssql_findandsampledata.rb
index 62c4761a3d..040294470c 100644
--- a/modules/auxiliary/admin/mssql/mssql_findandsampledata.rb
+++ b/modules/auxiliary/admin/mssql/mssql_findandsampledata.rb
@@ -452,5 +452,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/admin/mssql/mssql_idf.rb b/modules/auxiliary/admin/mssql/mssql_idf.rb
index 583c8d710c..90eac7e148 100644
--- a/modules/auxiliary/admin/mssql/mssql_idf.rb
+++ b/modules/auxiliary/admin/mssql/mssql_idf.rb
@@ -163,5 +163,4 @@ class MetasploitModule < Msf::Auxiliary
print_line
disconnect
end
-
end
diff --git a/modules/auxiliary/admin/mssql/mssql_ntlm_stealer.rb b/modules/auxiliary/admin/mssql/mssql_ntlm_stealer.rb
index 57b43d4e9f..6430fb70c5 100644
--- a/modules/auxiliary/admin/mssql/mssql_ntlm_stealer.rb
+++ b/modules/auxiliary/admin/mssql/mssql_ntlm_stealer.rb
@@ -76,5 +76,4 @@ class MetasploitModule < Msf::Auxiliary
print_good("Go check your SMB relay or capture module for goodies!")
end
-
end
diff --git a/modules/auxiliary/admin/mysql/mysql_enum.rb b/modules/auxiliary/admin/mysql/mysql_enum.rb
index aceb824352..208c9b6af9 100644
--- a/modules/auxiliary/admin/mysql/mysql_enum.rb
+++ b/modules/auxiliary/admin/mysql/mysql_enum.rb
@@ -240,5 +240,4 @@ class MetasploitModule < Msf::Auxiliary
mysql_logoff
end
-
end
diff --git a/modules/auxiliary/admin/mysql/mysql_sql.rb b/modules/auxiliary/admin/mysql/mysql_sql.rb
index 2989fa8458..9c8a7c9fe3 100644
--- a/modules/auxiliary/admin/mysql/mysql_sql.rb
+++ b/modules/auxiliary/admin/mysql/mysql_sql.rb
@@ -40,5 +40,4 @@ class MetasploitModule < Msf::Auxiliary
print_status(" | #{row.join(" | ")} |")
end
end
-
end
diff --git a/modules/auxiliary/admin/natpmp/natpmp_map.rb b/modules/auxiliary/admin/natpmp/natpmp_map.rb
index 58cb658756..2a4171daa1 100644
--- a/modules/auxiliary/admin/natpmp/natpmp_map.rb
+++ b/modules/auxiliary/admin/natpmp/natpmp_map.rb
@@ -115,5 +115,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("Unknown error: #{e.class} #{e.backtrace}")
end
end
-
end
diff --git a/modules/auxiliary/admin/netbios/netbios_spoof.rb b/modules/auxiliary/admin/netbios/netbios_spoof.rb
index 6aaf0c6b39..e83c9b6686 100644
--- a/modules/auxiliary/admin/netbios/netbios_spoof.rb
+++ b/modules/auxiliary/admin/netbios/netbios_spoof.rb
@@ -97,5 +97,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect_udp
end
-
end
diff --git a/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb b/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb
index 0328d8fb75..4b9545685d 100644
--- a/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb
+++ b/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb
@@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/admin/oracle/oracle_sql.rb b/modules/auxiliary/admin/oracle/oracle_sql.rb
index 9226b6e8bb..564afcd20a 100644
--- a/modules/auxiliary/admin/oracle/oracle_sql.rb
+++ b/modules/auxiliary/admin/oracle/oracle_sql.rb
@@ -46,5 +46,4 @@ class MetasploitModule < Msf::Auxiliary
return
end
end
-
end
diff --git a/modules/auxiliary/admin/oracle/post_exploitation/win32exec.rb b/modules/auxiliary/admin/oracle/post_exploitation/win32exec.rb
index 0ca237d4e2..df4447bcbf 100644
--- a/modules/auxiliary/admin/oracle/post_exploitation/win32exec.rb
+++ b/modules/auxiliary/admin/oracle/post_exploitation/win32exec.rb
@@ -77,5 +77,4 @@ class MetasploitModule < Msf::Auxiliary
prepare_exec(dropp)
end
-
end
diff --git a/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb b/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb
index c1f89c2453..5d7a09f332 100644
--- a/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb
+++ b/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb
@@ -88,5 +88,4 @@ EOF
prepare_exec(dropp)
end
-
end
diff --git a/modules/auxiliary/admin/pop2/uw_fileretrieval.rb b/modules/auxiliary/admin/pop2/uw_fileretrieval.rb
index e506b72db7..3695fa6dab 100644
--- a/modules/auxiliary/admin/pop2/uw_fileretrieval.rb
+++ b/modules/auxiliary/admin/pop2/uw_fileretrieval.rb
@@ -49,5 +49,4 @@ class MetasploitModule < Msf::Auxiliary
send_cmd( ['QUIT'] , true)
disconnect
end
-
end
diff --git a/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb b/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb
index 2b37b8292b..ff0ab6b8d1 100644
--- a/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb
+++ b/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb
@@ -317,6 +317,5 @@ class MetasploitModule < Msf::Auxiliary
result
end
-
end
diff --git a/modules/auxiliary/admin/scada/ge_proficy_substitute_traversal.rb b/modules/auxiliary/admin/scada/ge_proficy_substitute_traversal.rb
index 43a086316c..64c1522f8a 100644
--- a/modules/auxiliary/admin/scada/ge_proficy_substitute_traversal.rb
+++ b/modules/auxiliary/admin/scada/ge_proficy_substitute_traversal.rb
@@ -137,5 +137,4 @@ class MetasploitModule < Msf::Auxiliary
print_good("#{rhost}:#{rport} - File saved in: #{path}")
end
-
end
diff --git a/modules/auxiliary/admin/scada/modicon_password_recovery.rb b/modules/auxiliary/admin/scada/modicon_password_recovery.rb
index e2b521c22d..0ec97dcf45 100644
--- a/modules/auxiliary/admin/scada/modicon_password_recovery.rb
+++ b/modules/auxiliary/admin/scada/modicon_password_recovery.rb
@@ -243,5 +243,4 @@ class MetasploitModule < Msf::Auxiliary
# )
print_line logins.to_s
end
-
end
diff --git a/modules/auxiliary/admin/scada/modicon_stux_transfer.rb b/modules/auxiliary/admin/scada/modicon_stux_transfer.rb
index d38d17c780..c14ff941eb 100644
--- a/modules/auxiliary/admin/scada/modicon_stux_transfer.rb
+++ b/modules/auxiliary/admin/scada/modicon_stux_transfer.rb
@@ -304,5 +304,4 @@ class MetasploitModule < Msf::Auxiliary
def cleanup
disconnect rescue nil
end
-
end
diff --git a/modules/auxiliary/admin/scada/multi_cip_command.rb b/modules/auxiliary/admin/scada/multi_cip_command.rb
index 5f8ae7c223..8d3521189c 100644
--- a/modules/auxiliary/admin/scada/multi_cip_command.rb
+++ b/modules/auxiliary/admin/scada/multi_cip_command.rb
@@ -135,5 +135,4 @@ class MetasploitModule < Msf::Auxiliary
return nil
end
end
-
end
diff --git a/modules/auxiliary/admin/scada/yokogawa_bkbcopyd_client.rb b/modules/auxiliary/admin/scada/yokogawa_bkbcopyd_client.rb
index 2a20c2dbaa..cfa0bed3f8 100644
--- a/modules/auxiliary/admin/scada/yokogawa_bkbcopyd_client.rb
+++ b/modules/auxiliary/admin/scada/yokogawa_bkbcopyd_client.rb
@@ -124,6 +124,5 @@ class MetasploitModule < Msf::Auxiliary
def on_client_close(c)
stop_service
end
-
end
diff --git a/modules/auxiliary/admin/serverprotect/file.rb b/modules/auxiliary/admin/serverprotect/file.rb
index f3b87514a0..6226d62022 100644
--- a/modules/auxiliary/admin/serverprotect/file.rb
+++ b/modules/auxiliary/admin/serverprotect/file.rb
@@ -394,5 +394,4 @@ class MetasploitModule < Msf::Auxiliary
nil
end
end
-
end
diff --git a/modules/auxiliary/admin/smb/delete_file.rb b/modules/auxiliary/admin/smb/delete_file.rb
index f631453256..1c05542f59 100644
--- a/modules/auxiliary/admin/smb/delete_file.rb
+++ b/modules/auxiliary/admin/smb/delete_file.rb
@@ -67,5 +67,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("Unable to login: #{e.message}")
end
end
-
end
diff --git a/modules/auxiliary/admin/smb/download_file.rb b/modules/auxiliary/admin/smb/download_file.rb
index 4dba6ddf29..c3f90ade62 100644
--- a/modules/auxiliary/admin/smb/download_file.rb
+++ b/modules/auxiliary/admin/smb/download_file.rb
@@ -76,5 +76,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("Unable to login: #{e.message}")
end
end
-
end
diff --git a/modules/auxiliary/admin/smb/psexec_command.rb b/modules/auxiliary/admin/smb/psexec_command.rb
index e6cc6fa6b3..075dc0af9f 100644
--- a/modules/auxiliary/admin/smb/psexec_command.rb
+++ b/modules/auxiliary/admin/smb/psexec_command.rb
@@ -177,5 +177,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("Cleanup was successful")
end
end
-
end
diff --git a/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb b/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb
index ac03de5762..c0b1adf598 100644
--- a/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb
+++ b/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb
@@ -253,5 +253,4 @@ class MetasploitModule < Msf::Auxiliary
end
simple.disconnect("\\\\#{@ip}\\#{@smbshare}")
end
-
end
diff --git a/modules/auxiliary/admin/smb/samba_symlink_traversal.rb b/modules/auxiliary/admin/smb/samba_symlink_traversal.rb
index 7e692ef26b..9e8ec7e45e 100644
--- a/modules/auxiliary/admin/smb/samba_symlink_traversal.rb
+++ b/modules/auxiliary/admin/smb/samba_symlink_traversal.rb
@@ -59,5 +59,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("\t\\\\#{rhost}\\#{datastore['SMBSHARE']}\\#{datastore['SMBTARGET']}\\")
print_line("")
end
-
end
diff --git a/modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb b/modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb
index 8b8d172047..8701d7a516 100644
--- a/modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb
+++ b/modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb
@@ -155,5 +155,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("TTDB reply: 0x%x, %d" % arr)
sunrpc_destroy
end
-
end
diff --git a/modules/auxiliary/admin/tftp/tftp_transfer_util.rb b/modules/auxiliary/admin/tftp/tftp_transfer_util.rb
index 96ace31988..f656102586 100644
--- a/modules/auxiliary/admin/tftp/tftp_transfer_util.rb
+++ b/modules/auxiliary/admin/tftp/tftp_transfer_util.rb
@@ -215,5 +215,4 @@ class MetasploitModule < Msf::Auxiliary
vprint_status [rtarget,msg].join
end
end
-
end
diff --git a/modules/auxiliary/admin/vmware/poweron_vm.rb b/modules/auxiliary/admin/vmware/poweron_vm.rb
index 227633f95e..c44e99375b 100644
--- a/modules/auxiliary/admin/vmware/poweron_vm.rb
+++ b/modules/auxiliary/admin/vmware/poweron_vm.rb
@@ -56,5 +56,4 @@ class MetasploitModule < Msf::Auxiliary
return
end
end
-
end
diff --git a/modules/auxiliary/admin/vmware/tag_vm.rb b/modules/auxiliary/admin/vmware/tag_vm.rb
index 368e1cf50c..c28b70e74e 100644
--- a/modules/auxiliary/admin/vmware/tag_vm.rb
+++ b/modules/auxiliary/admin/vmware/tag_vm.rb
@@ -60,5 +60,4 @@ class MetasploitModule < Msf::Auxiliary
return
end
end
-
end
diff --git a/modules/auxiliary/admin/vmware/terminate_esx_sessions.rb b/modules/auxiliary/admin/vmware/terminate_esx_sessions.rb
index a97b8c104d..c2a4d040a2 100644
--- a/modules/auxiliary/admin/vmware/terminate_esx_sessions.rb
+++ b/modules/auxiliary/admin/vmware/terminate_esx_sessions.rb
@@ -47,5 +47,4 @@ class MetasploitModule < Msf::Auxiliary
return
end
end
-
end
diff --git a/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb b/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb
index 403815bbde..1087d07f45 100644
--- a/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb
+++ b/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb
@@ -82,5 +82,4 @@ class MetasploitModule < Msf::Auxiliary
wdbrpc_client_disconnect
end
-
end
diff --git a/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb b/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb
index 7d1eb963ca..e326b697d9 100644
--- a/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb
+++ b/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb
@@ -102,5 +102,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("Dumped #{"0x%.8x" % idx} bytes.")
wdbrpc_client_disconnect
end
-
end
diff --git a/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb b/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb
index a32e0c314f..56d310d7ed 100644
--- a/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb
+++ b/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb
@@ -52,5 +52,4 @@ class MetasploitModule < Msf::Auxiliary
wdbrpc_client_disconnect
end
-
end
diff --git a/modules/auxiliary/admin/webmin/edit_html_fileaccess.rb b/modules/auxiliary/admin/webmin/edit_html_fileaccess.rb
index 8cf1dceda2..7675b1f5b5 100644
--- a/modules/auxiliary/admin/webmin/edit_html_fileaccess.rb
+++ b/modules/auxiliary/admin/webmin/edit_html_fileaccess.rb
@@ -101,5 +101,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/admin/webmin/file_disclosure.rb b/modules/auxiliary/admin/webmin/file_disclosure.rb
index c8e987bcdd..0ea88e032a 100644
--- a/modules/auxiliary/admin/webmin/file_disclosure.rb
+++ b/modules/auxiliary/admin/webmin/file_disclosure.rb
@@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("No response from the server")
end
end
-
end
diff --git a/modules/auxiliary/admin/zend/java_bridge.rb b/modules/auxiliary/admin/zend/java_bridge.rb
index 34e5cd999f..b57e76224a 100644
--- a/modules/auxiliary/admin/zend/java_bridge.rb
+++ b/modules/auxiliary/admin/zend/java_bridge.rb
@@ -80,5 +80,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/analyze/jtr_aix.rb b/modules/auxiliary/analyze/jtr_aix.rb
index ae348e0cf9..451d751f02 100644
--- a/modules/auxiliary/analyze/jtr_aix.rb
+++ b/modules/auxiliary/analyze/jtr_aix.rb
@@ -93,5 +93,4 @@ class MetasploitModule < Msf::Auxiliary
print_status "Hashes Written out to #{hashlist.path}"
hashlist.path
end
-
end
diff --git a/modules/auxiliary/analyze/jtr_oracle_fast.rb b/modules/auxiliary/analyze/jtr_oracle_fast.rb
index 2f881556b3..573c08b302 100644
--- a/modules/auxiliary/analyze/jtr_oracle_fast.rb
+++ b/modules/auxiliary/analyze/jtr_oracle_fast.rb
@@ -107,5 +107,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/analyze/jtr_postgres_fast.rb b/modules/auxiliary/analyze/jtr_postgres_fast.rb
index da90279349..f95261a179 100644
--- a/modules/auxiliary/analyze/jtr_postgres_fast.rb
+++ b/modules/auxiliary/analyze/jtr_postgres_fast.rb
@@ -119,5 +119,4 @@ class MetasploitModule < Msf::Auxiliary
print_status "Hashes written out to #{hashlist.path}"
hashlist.path
end
-
end
diff --git a/modules/auxiliary/bnat/bnat_scan.rb b/modules/auxiliary/bnat/bnat_scan.rb
index e9da761180..cd8033ac2f 100644
--- a/modules/auxiliary/bnat/bnat_scan.rb
+++ b/modules/auxiliary/bnat/bnat_scan.rb
@@ -96,5 +96,4 @@ class MetasploitModule < Msf::Auxiliary
close_pcap
end
-
end
diff --git a/modules/auxiliary/client/mms/send_mms.rb b/modules/auxiliary/client/mms/send_mms.rb
index 7861634a22..9f4bf12a84 100644
--- a/modules/auxiliary/client/mms/send_mms.rb
+++ b/modules/auxiliary/client/mms/send_mms.rb
@@ -28,5 +28,4 @@ class MetasploitModule < Msf::Auxiliary
print_error(e.message)
end
end
-
end
diff --git a/modules/auxiliary/client/sms/send_text.rb b/modules/auxiliary/client/sms/send_text.rb
index 051008df8b..dbd63be10d 100644
--- a/modules/auxiliary/client/sms/send_text.rb
+++ b/modules/auxiliary/client/sms/send_text.rb
@@ -31,5 +31,4 @@ class MetasploitModule < Msf::Auxiliary
print_error(e.message)
end
end
-
end
diff --git a/modules/auxiliary/client/smtp/emailer.rb b/modules/auxiliary/client/smtp/emailer.rb
index 41e03b7dfc..cacfbdcc71 100644
--- a/modules/auxiliary/client/smtp/emailer.rb
+++ b/modules/auxiliary/client/smtp/emailer.rb
@@ -217,5 +217,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("Email sent..")
end
-
end
diff --git a/modules/auxiliary/crawler/msfcrawler.rb b/modules/auxiliary/crawler/msfcrawler.rb
index 4493eed27c..1c8872f844 100644
--- a/modules/auxiliary/crawler/msfcrawler.rb
+++ b/modules/auxiliary/crawler/msfcrawler.rb
@@ -403,7 +403,6 @@ class MetasploitModule < Msf::Auxiliary
def hashsig(hashreq)
hashreq.to_s
end
-
end
class BaseParser
diff --git a/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb b/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb
index 97a31074f6..1793796005 100644
--- a/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb
+++ b/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb
@@ -43,7 +43,6 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
=begin
diff --git a/modules/auxiliary/dos/dhcp/isc_dhcpd_clientid.rb b/modules/auxiliary/dos/dhcp/isc_dhcpd_clientid.rb
index f326cc4ec4..05b605bc1e 100644
--- a/modules/auxiliary/dos/dhcp/isc_dhcpd_clientid.rb
+++ b/modules/auxiliary/dos/dhcp/isc_dhcpd_clientid.rb
@@ -63,5 +63,4 @@ class MetasploitModule < Msf::Auxiliary
req[28,6] = chaddr
req + payload
end
-
end
diff --git a/modules/auxiliary/dos/dns/bind_tkey.rb b/modules/auxiliary/dos/dns/bind_tkey.rb
index 80e6b9e15c..1f1fd24537 100644
--- a/modules/auxiliary/dos/dns/bind_tkey.rb
+++ b/modules/auxiliary/dos/dns/bind_tkey.rb
@@ -83,5 +83,4 @@ class MetasploitModule < Msf::Auxiliary
query << txt_length # TXT Length
query << txt # TXT
end
-
end
diff --git a/modules/auxiliary/dos/freebsd/nfsd/nfsd_mount.rb b/modules/auxiliary/dos/freebsd/nfsd/nfsd_mount.rb
index 36546ecd6b..3cb66a412b 100644
--- a/modules/auxiliary/dos/freebsd/nfsd/nfsd_mount.rb
+++ b/modules/auxiliary/dos/freebsd/nfsd/nfsd_mount.rb
@@ -39,5 +39,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/http/3com_superstack_switch.rb b/modules/auxiliary/dos/http/3com_superstack_switch.rb
index 04aa47d418..134a231a47 100644
--- a/modules/auxiliary/dos/http/3com_superstack_switch.rb
+++ b/modules/auxiliary/dos/http/3com_superstack_switch.rb
@@ -50,5 +50,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/dos/http/apache_mod_isapi.rb b/modules/auxiliary/dos/http/apache_mod_isapi.rb
index c30e4d5897..edfa52f189 100644
--- a/modules/auxiliary/dos/http/apache_mod_isapi.rb
+++ b/modules/auxiliary/dos/http/apache_mod_isapi.rb
@@ -90,5 +90,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/http/dell_openmanage_post.rb b/modules/auxiliary/dos/http/dell_openmanage_post.rb
index 941c4390b3..5029fc3db2 100644
--- a/modules/auxiliary/dos/http/dell_openmanage_post.rb
+++ b/modules/auxiliary/dos/http/dell_openmanage_post.rb
@@ -50,5 +50,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb b/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb
index 72de249335..528c9e8e6a 100644
--- a/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb
+++ b/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb
@@ -56,5 +56,4 @@ class MetasploitModule < Msf::Auxiliary
close_pcap
end
-
end
diff --git a/modules/auxiliary/dos/samba/lsa_addprivs_heap.rb b/modules/auxiliary/dos/samba/lsa_addprivs_heap.rb
index a312e2fdd6..83a41f1556 100644
--- a/modules/auxiliary/dos/samba/lsa_addprivs_heap.rb
+++ b/modules/auxiliary/dos/samba/lsa_addprivs_heap.rb
@@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/samba/lsa_transnames_heap.rb b/modules/auxiliary/dos/samba/lsa_transnames_heap.rb
index af688376d4..a137b86145 100644
--- a/modules/auxiliary/dos/samba/lsa_transnames_heap.rb
+++ b/modules/auxiliary/dos/samba/lsa_transnames_heap.rb
@@ -75,5 +75,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/samba/read_nttrans_ea_list.rb b/modules/auxiliary/dos/samba/read_nttrans_ea_list.rb
index 7057a5ee02..4bc015208e 100644
--- a/modules/auxiliary/dos/samba/read_nttrans_ea_list.rb
+++ b/modules/auxiliary/dos/samba/read_nttrans_ea_list.rb
@@ -121,5 +121,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect()
end
end
-
end
diff --git a/modules/auxiliary/dos/scada/d20_tftp_overflow.rb b/modules/auxiliary/dos/scada/d20_tftp_overflow.rb
index 2770b4d07e..1772bc750d 100644
--- a/modules/auxiliary/dos/scada/d20_tftp_overflow.rb
+++ b/modules/auxiliary/dos/scada/d20_tftp_overflow.rb
@@ -132,5 +132,4 @@ class MetasploitModule < Msf::Auxiliary
"\x80\x80\x81\xFA\x80\x80\x81\xFB\x80\x80\x81\xFC\x80\x80\x81\xFD\x80\x80\x81\xFE" +
"\x80\x80\x82\x80\x80\x80\x82\x81"
end
-
end
diff --git a/modules/auxiliary/dos/scada/yokogawa_logsvr.rb b/modules/auxiliary/dos/scada/yokogawa_logsvr.rb
index 7100ddf509..161d87c5c5 100644
--- a/modules/auxiliary/dos/scada/yokogawa_logsvr.rb
+++ b/modules/auxiliary/dos/scada/yokogawa_logsvr.rb
@@ -69,5 +69,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect_udp
end
-
end
diff --git a/modules/auxiliary/dos/smtp/sendmail_prescan.rb b/modules/auxiliary/dos/smtp/sendmail_prescan.rb
index 11bfe61d69..e34093c68f 100644
--- a/modules/auxiliary/dos/smtp/sendmail_prescan.rb
+++ b/modules/auxiliary/dos/smtp/sendmail_prescan.rb
@@ -51,7 +51,6 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
=begin
diff --git a/modules/auxiliary/dos/solaris/lpd/cascade_delete.rb b/modules/auxiliary/dos/solaris/lpd/cascade_delete.rb
index e6c2ec69fb..004d9a7b9a 100644
--- a/modules/auxiliary/dos/solaris/lpd/cascade_delete.rb
+++ b/modules/auxiliary/dos/solaris/lpd/cascade_delete.rb
@@ -100,5 +100,4 @@ class MetasploitModule < Msf::Auxiliary
print_status(sprintf(" Uploaded %.4d bytes >> #{name}", data.length))
return true
end
-
end
diff --git a/modules/auxiliary/dos/windows/appian/appian_bpm.rb b/modules/auxiliary/dos/windows/appian/appian_bpm.rb
index 344a888478..062d36e61e 100644
--- a/modules/auxiliary/dos/windows/appian/appian_bpm.rb
+++ b/modules/auxiliary/dos/windows/appian/appian_bpm.rb
@@ -87,5 +87,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb b/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb
index ebd94faefc..36b341b72d 100644
--- a/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb
+++ b/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb
@@ -39,5 +39,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
end
-
end
diff --git a/modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb b/modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb
index dc90911428..495d350326 100644
--- a/modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb
+++ b/modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb
@@ -47,5 +47,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb b/modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb
index 588b62dc36..631356681c 100644
--- a/modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb
+++ b/modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb
@@ -64,7 +64,6 @@ class MetasploitModule < Msf::Auxiliary
disconnect
rescue ::Rex::ConnectionError
end
-
end
=begin
diff --git a/modules/auxiliary/dos/windows/ftp/iis_list_exhaustion.rb b/modules/auxiliary/dos/windows/ftp/iis_list_exhaustion.rb
index 64ffc1764f..122d3d3689 100644
--- a/modules/auxiliary/dos/windows/ftp/iis_list_exhaustion.rb
+++ b/modules/auxiliary/dos/windows/ftp/iis_list_exhaustion.rb
@@ -112,5 +112,4 @@ class MetasploitModule < Msf::Auxiliary
ret = [ ret, data ]
ret
end
-
end
diff --git a/modules/auxiliary/dos/windows/ftp/solarftp_user.rb b/modules/auxiliary/dos/windows/ftp/solarftp_user.rb
index cc3e24e25e..5968ce3218 100644
--- a/modules/auxiliary/dos/windows/ftp/solarftp_user.rb
+++ b/modules/auxiliary/dos/windows/ftp/solarftp_user.rb
@@ -48,5 +48,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/windows/games/kaillera.rb b/modules/auxiliary/dos/windows/games/kaillera.rb
index ae3b337eb1..3ecb2b1d8e 100644
--- a/modules/auxiliary/dos/windows/games/kaillera.rb
+++ b/modules/auxiliary/dos/windows/games/kaillera.rb
@@ -56,5 +56,4 @@ class MetasploitModule < Msf::Auxiliary
print_good("Target is down")
end
end
-
end
diff --git a/modules/auxiliary/dos/windows/nat/nat_helper.rb b/modules/auxiliary/dos/windows/nat/nat_helper.rb
index 9096028d7f..cab5599936 100644
--- a/modules/auxiliary/dos/windows/nat/nat_helper.rb
+++ b/modules/auxiliary/dos/windows/nat/nat_helper.rb
@@ -43,5 +43,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect_udp
end
-
end
diff --git a/modules/auxiliary/dos/windows/rdp/ms12_020_maxchannelids.rb b/modules/auxiliary/dos/windows/rdp/ms12_020_maxchannelids.rb
index fe14ca95f2..4e5d1522dc 100644
--- a/modules/auxiliary/dos/windows/rdp/ms12_020_maxchannelids.rb
+++ b/modules/auxiliary/dos/windows/rdp/ms12_020_maxchannelids.rb
@@ -163,5 +163,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb b/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb
index 9185588b90..2ed092e859 100644
--- a/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb
+++ b/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb
@@ -102,5 +102,4 @@ long function_0a (
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb b/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb
index b07c39a84c..90f6ef055f 100644
--- a/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb
+++ b/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb
@@ -90,5 +90,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb b/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb
index 515fc70115..bb315d7fba 100644
--- a/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb
+++ b/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb
@@ -58,5 +58,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/windows/smb/ms09_001_write.rb b/modules/auxiliary/dos/windows/smb/ms09_001_write.rb
index d5d93cfdb6..827a2fdaab 100644
--- a/modules/auxiliary/dos/windows/smb/ms09_001_write.rb
+++ b/modules/auxiliary/dos/windows/smb/ms09_001_write.rb
@@ -114,5 +114,4 @@ class MetasploitModule < Msf::Auxiliary
j=j-10000
end
end
-
end
diff --git a/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh.rb b/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh.rb
index 5d289b3998..4901e7fb80 100644
--- a/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh.rb
+++ b/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh.rb
@@ -66,7 +66,6 @@ class MetasploitModule < Msf::Auxiliary
disconnect()
end
-
end
=begin
diff --git a/modules/auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff.rb b/modules/auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff.rb
index bd7d4f2be6..ee0d113050 100644
--- a/modules/auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff.rb
+++ b/modules/auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff.rb
@@ -60,7 +60,6 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
=begin
diff --git a/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb b/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb
index a4b753adbb..41142ffec5 100644
--- a/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb
+++ b/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb
@@ -110,5 +110,4 @@ class MetasploitModule < Msf::Auxiliary
select(nil, nil, nil, 0.5)
end
-
end
diff --git a/modules/auxiliary/dos/windows/smb/ms11_019_electbowser.rb b/modules/auxiliary/dos/windows/smb/ms11_019_electbowser.rb
index 7541a1c3ed..fdde3cb4e5 100644
--- a/modules/auxiliary/dos/windows/smb/ms11_019_electbowser.rb
+++ b/modules/auxiliary/dos/windows/smb/ms11_019_electbowser.rb
@@ -169,5 +169,4 @@ class MetasploitModule < Msf::Auxiliary
ret << svc
ret
end
-
end
diff --git a/modules/auxiliary/dos/windows/smb/rras_vls_null_deref.rb b/modules/auxiliary/dos/windows/smb/rras_vls_null_deref.rb
index c1ca3c06c5..70c6866ac3 100644
--- a/modules/auxiliary/dos/windows/smb/rras_vls_null_deref.rb
+++ b/modules/auxiliary/dos/windows/smb/rras_vls_null_deref.rb
@@ -70,5 +70,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/windows/smtp/ms06_019_exchange.rb b/modules/auxiliary/dos/windows/smtp/ms06_019_exchange.rb
index e9b5c27bb0..f8e2d0ae99 100644
--- a/modules/auxiliary/dos/windows/smtp/ms06_019_exchange.rb
+++ b/modules/auxiliary/dos/windows/smtp/ms06_019_exchange.rb
@@ -107,5 +107,4 @@ class MetasploitModule < Msf::Auxiliary
print "<< " + (sock.get_once || '')
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/windows/ssh/sysax_sshd_kexchange.rb b/modules/auxiliary/dos/windows/ssh/sysax_sshd_kexchange.rb
index 64863354ad..c751c3c3e9 100644
--- a/modules/auxiliary/dos/windows/ssh/sysax_sshd_kexchange.rb
+++ b/modules/auxiliary/dos/windows/ssh/sysax_sshd_kexchange.rb
@@ -74,5 +74,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/dos/windows/tftp/solarwinds.rb b/modules/auxiliary/dos/windows/tftp/solarwinds.rb
index a6900c18d4..ae997facdb 100644
--- a/modules/auxiliary/dos/windows/tftp/solarwinds.rb
+++ b/modules/auxiliary/dos/windows/tftp/solarwinds.rb
@@ -35,5 +35,4 @@ class MetasploitModule < Msf::Auxiliary
udp_sock.put("\x00\x01\x01\x00\x6e\x65\x74\x61\x73\x63\x69\x69\x00")
disconnect_udp
end
-
end
diff --git a/modules/auxiliary/dos/wireshark/ldap.rb b/modules/auxiliary/dos/wireshark/ldap.rb
index d21f085046..1009867ff4 100644
--- a/modules/auxiliary/dos/wireshark/ldap.rb
+++ b/modules/auxiliary/dos/wireshark/ldap.rb
@@ -54,5 +54,4 @@ class MetasploitModule < Msf::Auxiliary
close_pcap
end
-
end
diff --git a/modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb b/modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb
index 7716f0b0e5..bd753aef9e 100644
--- a/modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb
+++ b/modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb
@@ -250,5 +250,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb b/modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb
index ecb6ce8444..dc3e83646c 100644
--- a/modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb
+++ b/modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb
@@ -152,5 +152,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/gather/advantech_webaccess_creds.rb b/modules/auxiliary/gather/advantech_webaccess_creds.rb
index 832d1819a0..b3fefbcc84 100644
--- a/modules/auxiliary/gather/advantech_webaccess_creds.rb
+++ b/modules/auxiliary/gather/advantech_webaccess_creds.rb
@@ -168,5 +168,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/gather/alienvault_iso27001_sqli.rb b/modules/auxiliary/gather/alienvault_iso27001_sqli.rb
index 875f0b718e..15466154e4 100644
--- a/modules/auxiliary/gather/alienvault_iso27001_sqli.rb
+++ b/modules/auxiliary/gather/alienvault_iso27001_sqli.rb
@@ -144,6 +144,5 @@ class MetasploitModule < Msf::Auxiliary
return nil
end
end
-
end
diff --git a/modules/auxiliary/gather/alienvault_newpolicyform_sqli.rb b/modules/auxiliary/gather/alienvault_newpolicyform_sqli.rb
index 72bd3bbf42..2c722a6d5f 100644
--- a/modules/auxiliary/gather/alienvault_newpolicyform_sqli.rb
+++ b/modules/auxiliary/gather/alienvault_newpolicyform_sqli.rb
@@ -156,5 +156,4 @@ class MetasploitModule < Msf::Auxiliary
return nil
end
end
-
end
diff --git a/modules/auxiliary/gather/android_browser_file_theft.rb b/modules/auxiliary/gather/android_browser_file_theft.rb
index 12efede57e..00cdc47ace 100644
--- a/modules/auxiliary/gather/android_browser_file_theft.rb
+++ b/modules/auxiliary/gather/android_browser_file_theft.rb
@@ -177,5 +177,4 @@ class MetasploitModule < Msf::Auxiliary
def hex2bin(hex)
hex.chars.each_slice(2).map(&:join).map { |c| c.to_i(16) }.map(&:chr).join
end
-
end
diff --git a/modules/auxiliary/gather/android_browser_new_tab_cookie_theft.rb b/modules/auxiliary/gather/android_browser_new_tab_cookie_theft.rb
index e573118136..2a5d5f97d1 100644
--- a/modules/auxiliary/gather/android_browser_new_tab_cookie_theft.rb
+++ b/modules/auxiliary/gather/android_browser_new_tab_cookie_theft.rb
@@ -137,5 +137,4 @@ class MetasploitModule < Msf::Auxiliary
def per_run_token
@token ||= Rex::Text.rand_text_alpha(rand(2)+1)
end
-
end
diff --git a/modules/auxiliary/gather/android_htmlfileprovider.rb b/modules/auxiliary/gather/android_htmlfileprovider.rb
index c0b2acfa1a..da887057c8 100644
--- a/modules/auxiliary/gather/android_htmlfileprovider.rb
+++ b/modules/auxiliary/gather/android_htmlfileprovider.rb
@@ -174,5 +174,4 @@ EOS
def run
exploit()
end
-
end
diff --git a/modules/auxiliary/gather/android_object_tag_webview_uxss.rb b/modules/auxiliary/gather/android_object_tag_webview_uxss.rb
index 75a8e11649..ab7fb2f934 100644
--- a/modules/auxiliary/gather/android_object_tag_webview_uxss.rb
+++ b/modules/auxiliary/gather/android_object_tag_webview_uxss.rb
@@ -141,5 +141,4 @@ class MetasploitModule < Msf::Auxiliary
def run
exploit
end
-
end
diff --git a/modules/auxiliary/gather/android_stock_browser_uxss.rb b/modules/auxiliary/gather/android_stock_browser_uxss.rb
index 4421fcde24..fc5b6de637 100644
--- a/modules/auxiliary/gather/android_stock_browser_uxss.rb
+++ b/modules/auxiliary/gather/android_stock_browser_uxss.rb
@@ -233,5 +233,4 @@ class MetasploitModule < Msf::Auxiliary
def run
exploit
end
-
end
diff --git a/modules/auxiliary/gather/apache_rave_creds.rb b/modules/auxiliary/gather/apache_rave_creds.rb
index 3dd1bbfeae..0981a816a8 100644
--- a/modules/auxiliary/gather/apache_rave_creds.rb
+++ b/modules/auxiliary/gather/apache_rave_creds.rb
@@ -227,5 +227,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/gather/apple_safari_ftp_url_cookie_theft.rb b/modules/auxiliary/gather/apple_safari_ftp_url_cookie_theft.rb
index 90c184046d..c4e3b6c90e 100644
--- a/modules/auxiliary/gather/apple_safari_ftp_url_cookie_theft.rb
+++ b/modules/auxiliary/gather/apple_safari_ftp_url_cookie_theft.rb
@@ -255,5 +255,4 @@ class MetasploitModule < Msf::Auxiliary
def grab_key
@grab_key ||= Rex::Text.rand_text_alphanumeric(8)
end
-
end
diff --git a/modules/auxiliary/gather/browser_info.rb b/modules/auxiliary/gather/browser_info.rb
index 8b3741681e..f0add1bf09 100644
--- a/modules/auxiliary/gather/browser_info.rb
+++ b/modules/auxiliary/gather/browser_info.rb
@@ -79,5 +79,4 @@ class MetasploitModule < Msf::Auxiliary
def run
exploit
end
-
end
diff --git a/modules/auxiliary/gather/checkpoint_hostname.rb b/modules/auxiliary/gather/checkpoint_hostname.rb
index baafe1cd4e..95ed3478de 100644
--- a/modules/auxiliary/gather/checkpoint_hostname.rb
+++ b/modules/auxiliary/gather/checkpoint_hostname.rb
@@ -90,5 +90,4 @@ class MetasploitModule < Msf::Auxiliary
}
report_service(svc_info)
end
-
end
diff --git a/modules/auxiliary/gather/citrix_published_applications.rb b/modules/auxiliary/gather/citrix_published_applications.rb
index e53ba06bed..41d2825157 100644
--- a/modules/auxiliary/gather/citrix_published_applications.rb
+++ b/modules/auxiliary/gather/citrix_published_applications.rb
@@ -70,5 +70,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect_udp
end
-
end
diff --git a/modules/auxiliary/gather/citrix_published_bruteforce.rb b/modules/auxiliary/gather/citrix_published_bruteforce.rb
index 297f37c5c7..b325b7ca2e 100644
--- a/modules/auxiliary/gather/citrix_published_bruteforce.rb
+++ b/modules/auxiliary/gather/citrix_published_bruteforce.rb
@@ -176,5 +176,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect_udp
end
-
end
diff --git a/modules/auxiliary/gather/corpwatch_lookup_id.rb b/modules/auxiliary/gather/corpwatch_lookup_id.rb
index 209334c430..e889fd1723 100644
--- a/modules/auxiliary/gather/corpwatch_lookup_id.rb
+++ b/modules/auxiliary/gather/corpwatch_lookup_id.rb
@@ -535,5 +535,4 @@ class MetasploitModule < Msf::Auxiliary
e.get_elements(name)[0].get_text ) ?
e.get_elements(name)[0].get_text.to_s : ""
end
-
end
diff --git a/modules/auxiliary/gather/corpwatch_lookup_name.rb b/modules/auxiliary/gather/corpwatch_lookup_name.rb
index e60f431c04..4d514d0ba7 100644
--- a/modules/auxiliary/gather/corpwatch_lookup_name.rb
+++ b/modules/auxiliary/gather/corpwatch_lookup_name.rb
@@ -129,5 +129,4 @@ class MetasploitModule < Msf::Auxiliary
e.get_elements(name)[0].get_text ) ?
e.get_elements(name)[0].get_text.to_s : ""
end
-
end
diff --git a/modules/auxiliary/gather/external_ip.rb b/modules/auxiliary/gather/external_ip.rb
index 9926b1ce5c..f283d859ca 100644
--- a/modules/auxiliary/gather/external_ip.rb
+++ b/modules/auxiliary/gather/external_ip.rb
@@ -48,5 +48,4 @@ end
report_host(our_addr) if datastore['REPORT_HOST']
end
end
-
end
diff --git a/modules/auxiliary/gather/flash_rosetta_jsonp_url_disclosure.rb b/modules/auxiliary/gather/flash_rosetta_jsonp_url_disclosure.rb
index 5cbb689dff..7f994e9e1d 100644
--- a/modules/auxiliary/gather/flash_rosetta_jsonp_url_disclosure.rb
+++ b/modules/auxiliary/gather/flash_rosetta_jsonp_url_disclosure.rb
@@ -195,5 +195,4 @@ class MetasploitModule < Msf::Auxiliary
def rhost
URI.parse(datastore["JSONP_URL"]).host
end
-
end
diff --git a/modules/auxiliary/gather/ibm_sametime_enumerate_users.rb b/modules/auxiliary/gather/ibm_sametime_enumerate_users.rb
index f36b7fc006..c7673de74b 100644
--- a/modules/auxiliary/gather/ibm_sametime_enumerate_users.rb
+++ b/modules/auxiliary/gather/ibm_sametime_enumerate_users.rb
@@ -304,5 +304,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("No users discovered")
end
end
-
end
diff --git a/modules/auxiliary/gather/ibm_sametime_room_brute.rb b/modules/auxiliary/gather/ibm_sametime_room_brute.rb
index 8645626e4c..beddef0265 100644
--- a/modules/auxiliary/gather/ibm_sametime_room_brute.rb
+++ b/modules/auxiliary/gather/ibm_sametime_room_brute.rb
@@ -189,5 +189,4 @@ class MetasploitModule < Msf::Auxiliary
print_good(roomtbl.to_s)
end
-
end
diff --git a/modules/auxiliary/gather/ibm_sametime_version.rb b/modules/auxiliary/gather/ibm_sametime_version.rb
index 4811af02ad..133ff053e8 100644
--- a/modules/auxiliary/gather/ibm_sametime_version.rb
+++ b/modules/auxiliary/gather/ibm_sametime_version.rb
@@ -321,5 +321,4 @@ class MetasploitModule < Msf::Auxiliary
report unless @version_info.empty?
end
-
end
diff --git a/modules/auxiliary/gather/ie_uxss_injection.rb b/modules/auxiliary/gather/ie_uxss_injection.rb
index 479d1ea070..3bd4dff636 100644
--- a/modules/auxiliary/gather/ie_uxss_injection.rb
+++ b/modules/auxiliary/gather/ie_uxss_injection.rb
@@ -149,5 +149,4 @@ class MetasploitModule < Msf::Auxiliary
send_response(cli, get_html)
end
end
-
end
diff --git a/modules/auxiliary/gather/jenkins_cred_recovery.rb b/modules/auxiliary/gather/jenkins_cred_recovery.rb
index 2e6c92fa03..2e2f55e38c 100644
--- a/modules/auxiliary/gather/jenkins_cred_recovery.rb
+++ b/modules/auxiliary/gather/jenkins_cred_recovery.rb
@@ -289,5 +289,4 @@ class MetasploitModule < Msf::Auxiliary
def print_error(msg='')
super("#{peer} - #{msg}")
end
-
end
diff --git a/modules/auxiliary/gather/joomla_contenthistory_sqli.rb b/modules/auxiliary/gather/joomla_contenthistory_sqli.rb
index 4af07bf02a..576398df28 100644
--- a/modules/auxiliary/gather/joomla_contenthistory_sqli.rb
+++ b/modules/auxiliary/gather/joomla_contenthistory_sqli.rb
@@ -203,5 +203,4 @@ class MetasploitModule < Msf::Auxiliary
}
)
end
-
end
diff --git a/modules/auxiliary/gather/mantisbt_admin_sqli.rb b/modules/auxiliary/gather/mantisbt_admin_sqli.rb
index a5853703ac..2dc8b64acf 100644
--- a/modules/auxiliary/gather/mantisbt_admin_sqli.rb
+++ b/modules/auxiliary/gather/mantisbt_admin_sqli.rb
@@ -96,5 +96,4 @@ class MetasploitModule < Msf::Auxiliary
print_good("File saved to: #{path}")
end
end
-
end
diff --git a/modules/auxiliary/gather/mcafee_epo_xxe.rb b/modules/auxiliary/gather/mcafee_epo_xxe.rb
index 1aa8da7a60..c6d24d2f7d 100644
--- a/modules/auxiliary/gather/mcafee_epo_xxe.rb
+++ b/modules/auxiliary/gather/mcafee_epo_xxe.rb
@@ -253,5 +253,4 @@ class MetasploitModule < Msf::Auxiliary
print_good("The decrypted password for the keystore, 'sa' SQL user (if using local instance), and possibly 'admin' is: #{passphrase}")
end
-
end
diff --git a/modules/auxiliary/gather/ms14_052_xmldom.rb b/modules/auxiliary/gather/ms14_052_xmldom.rb
index 5b343b1b51..9f49f07f33 100644
--- a/modules/auxiliary/gather/ms14_052_xmldom.rb
+++ b/modules/auxiliary/gather/ms14_052_xmldom.rb
@@ -215,5 +215,4 @@ class MetasploitModule < Msf::Auxiliary
send_response(cli, html)
end
end
-
end
diff --git a/modules/auxiliary/gather/qnap_backtrace_admin_hash.rb b/modules/auxiliary/gather/qnap_backtrace_admin_hash.rb
index 2e4425d4de..7e215d17da 100644
--- a/modules/auxiliary/gather/qnap_backtrace_admin_hash.rb
+++ b/modules/auxiliary/gather/qnap_backtrace_admin_hash.rb
@@ -204,5 +204,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/gather/safari_file_url_navigation.rb b/modules/auxiliary/gather/safari_file_url_navigation.rb
index 01b8aefb8f..1febe02732 100644
--- a/modules/auxiliary/gather/safari_file_url_navigation.rb
+++ b/modules/auxiliary/gather/safari_file_url_navigation.rb
@@ -340,5 +340,4 @@ class MetasploitModule < Msf::Auxiliary
rescue
end
end
-
end
diff --git a/modules/auxiliary/gather/windows_deployment_services_shares.rb b/modules/auxiliary/gather/windows_deployment_services_shares.rb
index 0b883b4bae..49fa8e9944 100644
--- a/modules/auxiliary/gather/windows_deployment_services_shares.rb
+++ b/modules/auxiliary/gather/windows_deployment_services_shares.rb
@@ -249,6 +249,5 @@ class MetasploitModule < Msf::Auxiliary
proof: domain
)
end
-
end
diff --git a/modules/auxiliary/pdf/foxit/authbypass.rb b/modules/auxiliary/pdf/foxit/authbypass.rb
index 76b48dc177..896cd5535a 100644
--- a/modules/auxiliary/pdf/foxit/authbypass.rb
+++ b/modules/auxiliary/pdf/foxit/authbypass.rb
@@ -110,5 +110,4 @@ class MetasploitModule < Msf::Auxiliary
pdf << "%%EOF" << eol
end
-
end
diff --git a/modules/auxiliary/scanner/db2/db2_auth.rb b/modules/auxiliary/scanner/db2/db2_auth.rb
index 278b797c7e..62526e90af 100644
--- a/modules/auxiliary/scanner/db2/db2_auth.rb
+++ b/modules/auxiliary/scanner/db2/db2_auth.rb
@@ -90,5 +90,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/dcerpc/management.rb b/modules/auxiliary/scanner/dcerpc/management.rb
index bcb50dea01..2fc09d3077 100644
--- a/modules/auxiliary/scanner/dcerpc/management.rb
+++ b/modules/auxiliary/scanner/dcerpc/management.rb
@@ -84,5 +84,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("Error: #{e}")
end
end
-
end
diff --git a/modules/auxiliary/scanner/discovery/arp_sweep.rb b/modules/auxiliary/scanner/discovery/arp_sweep.rb
index 8e40cb49a8..3edd308a9f 100644
--- a/modules/auxiliary/scanner/discovery/arp_sweep.rb
+++ b/modules/auxiliary/scanner/discovery/arp_sweep.rb
@@ -109,5 +109,4 @@ class MetasploitModule < Msf::Auxiliary
return unless pkt.arp_opcode == 2
pkt
end
-
end
diff --git a/modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb b/modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb
index cac7ab960a..54ff519d05 100644
--- a/modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb
+++ b/modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb
@@ -98,5 +98,4 @@ class MetasploitModule < Msf::Auxiliary
# Close capture
close_pcap()
end
-
end
diff --git a/modules/auxiliary/scanner/discovery/ipv6_neighbor.rb b/modules/auxiliary/scanner/discovery/ipv6_neighbor.rb
index 59e5416773..1ac5dd0a09 100644
--- a/modules/auxiliary/scanner/discovery/ipv6_neighbor.rb
+++ b/modules/auxiliary/scanner/discovery/ipv6_neighbor.rb
@@ -213,5 +213,4 @@ class MetasploitModule < Msf::Auxiliary
return unless p.payload[0,2] == "\x88\x00"
p
end
-
end
diff --git a/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb b/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb
index f1f6787468..46d2aafe7c 100644
--- a/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb
+++ b/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb
@@ -188,5 +188,4 @@ class MetasploitModule < Msf::Auxiliary
# Close capture
close_pcap()
end
-
end
diff --git a/modules/auxiliary/scanner/discovery/udp_probe.rb b/modules/auxiliary/scanner/discovery/udp_probe.rb
index d0b1113202..abb929179b 100644
--- a/modules/auxiliary/scanner/discovery/udp_probe.rb
+++ b/modules/auxiliary/scanner/discovery/udp_probe.rb
@@ -532,5 +532,4 @@ class MetasploitModule < Msf::Auxiliary
def probe_pkt_pca_nq(ip)
return ["NQ", 5632]
end
-
end
diff --git a/modules/auxiliary/scanner/discovery/udp_sweep.rb b/modules/auxiliary/scanner/discovery/udp_sweep.rb
index 616d790af8..19c0c87af8 100644
--- a/modules/auxiliary/scanner/discovery/udp_sweep.rb
+++ b/modules/auxiliary/scanner/discovery/udp_sweep.rb
@@ -488,5 +488,4 @@ class MetasploitModule < Msf::Auxiliary
def probe_pkt_pca_nq(ip)
return ["NQ", 5632]
end
-
end
diff --git a/modules/auxiliary/scanner/elasticsearch/indices_enum.rb b/modules/auxiliary/scanner/elasticsearch/indices_enum.rb
index d093f0d6dd..fa78719e12 100644
--- a/modules/auxiliary/scanner/elasticsearch/indices_enum.rb
+++ b/modules/auxiliary/scanner/elasticsearch/indices_enum.rb
@@ -78,5 +78,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/finger/finger_users.rb b/modules/auxiliary/scanner/finger/finger_users.rb
index e8594bc21a..829e0e45b3 100644
--- a/modules/auxiliary/scanner/finger/finger_users.rb
+++ b/modules/auxiliary/scanner/finger/finger_users.rb
@@ -196,5 +196,4 @@ class MetasploitModule < Msf::Auxiliary
end
return true
end
-
end
diff --git a/modules/auxiliary/scanner/ftp/titanftp_xcrc_traversal.rb b/modules/auxiliary/scanner/ftp/titanftp_xcrc_traversal.rb
index 21e2dab766..a972becc3b 100644
--- a/modules/auxiliary/scanner/ftp/titanftp_xcrc_traversal.rb
+++ b/modules/auxiliary/scanner/ftp/titanftp_xcrc_traversal.rb
@@ -121,5 +121,4 @@ class MetasploitModule < Msf::Auxiliary
percent = "%3.2f%%" % done.to_f
print_status("Obtaining file contents - %7s done (%d/%d bytes)" % [percent, current, total])
end
-
end
diff --git a/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb b/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb
index c8533bf0bd..20a6987663 100644
--- a/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb
+++ b/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb
@@ -92,5 +92,4 @@ class MetasploitModule < Msf::Auxiliary
vprint_error("Fail to obtain file for some unknown reason")
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/accellion_fta_statecode_file_read.rb b/modules/auxiliary/scanner/http/accellion_fta_statecode_file_read.rb
index 627d8147b0..3489465a1e 100644
--- a/modules/auxiliary/scanner/http/accellion_fta_statecode_file_read.rb
+++ b/modules/auxiliary/scanner/http/accellion_fta_statecode_file_read.rb
@@ -84,5 +84,4 @@ class MetasploitModule < Msf::Auxiliary
)
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/advantech_webaccess_login.rb b/modules/auxiliary/scanner/http/advantech_webaccess_login.rb
index 4564dfd7ec..657e16e514 100644
--- a/modules/auxiliary/scanner/http/advantech_webaccess_login.rb
+++ b/modules/auxiliary/scanner/http/advantech_webaccess_login.rb
@@ -134,5 +134,4 @@ class MetasploitModule < Msf::Auxiliary
bruteforce(ip)
end
-
end
diff --git a/modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb b/modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb
index 0c317f6341..a973081030 100644
--- a/modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb
+++ b/modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb
@@ -129,5 +129,4 @@ class MetasploitModule < Msf::Auxiliary
def marker
@marker ||= Rex::Text.rand_text_alphanumeric(rand(42) + 1)
end
-
end
diff --git a/modules/auxiliary/scanner/http/apache_userdir_enum.rb b/modules/auxiliary/scanner/http/apache_userdir_enum.rb
index 13665ee007..c480469c87 100644
--- a/modules/auxiliary/scanner/http/apache_userdir_enum.rb
+++ b/modules/auxiliary/scanner/http/apache_userdir_enum.rb
@@ -92,5 +92,4 @@ class MetasploitModule < Msf::Auxiliary
rescue ::Timeout::Error, ::Errno::EPIPE
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb b/modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb
index 25dbd7ec4a..3cdd6c1406 100644
--- a/modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb
+++ b/modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb
@@ -139,6 +139,5 @@ class MetasploitModule < Msf::Auxiliary
print_error("#{rhost}#{rport} Failed to retrieve file from #{rhost}:#{rport}")
end
-
end
diff --git a/modules/auxiliary/scanner/http/backup_file.rb b/modules/auxiliary/scanner/http/backup_file.rb
index 803068dc40..46703fd7e9 100644
--- a/modules/auxiliary/scanner/http/backup_file.rb
+++ b/modules/auxiliary/scanner/http/backup_file.rb
@@ -88,5 +88,4 @@ class MetasploitModule < Msf::Auxiliary
end
-
end
diff --git a/modules/auxiliary/scanner/http/barracuda_directory_traversal.rb b/modules/auxiliary/scanner/http/barracuda_directory_traversal.rb
index acc8772b3c..1e581da804 100644
--- a/modules/auxiliary/scanner/http/barracuda_directory_traversal.rb
+++ b/modules/auxiliary/scanner/http/barracuda_directory_traversal.rb
@@ -85,5 +85,4 @@ class MetasploitModule < Msf::Auxiliary
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout
rescue ::Timeout::Error, ::Errno::EPIPE
end
-
end
diff --git a/modules/auxiliary/scanner/http/bavision_cam_login.rb b/modules/auxiliary/scanner/http/bavision_cam_login.rb
index 2c2fbea651..08c2368ef1 100644
--- a/modules/auxiliary/scanner/http/bavision_cam_login.rb
+++ b/modules/auxiliary/scanner/http/bavision_cam_login.rb
@@ -131,5 +131,4 @@ class MetasploitModule < Msf::Auxiliary
bruteforce(ip)
end
-
end
diff --git a/modules/auxiliary/scanner/http/bitweaver_overlay_type_traversal.rb b/modules/auxiliary/scanner/http/bitweaver_overlay_type_traversal.rb
index 9234e0f52b..0e29a98fcc 100644
--- a/modules/auxiliary/scanner/http/bitweaver_overlay_type_traversal.rb
+++ b/modules/auxiliary/scanner/http/bitweaver_overlay_type_traversal.rb
@@ -89,7 +89,6 @@ class MetasploitModule < Msf::Auxiliary
print_error("Request failed due to some unknown reason")
end
end
-
end
=begin
diff --git a/modules/auxiliary/scanner/http/blind_sql_query.rb b/modules/auxiliary/scanner/http/blind_sql_query.rb
index 7834ad9be8..0cc7f39aba 100644
--- a/modules/auxiliary/scanner/http/blind_sql_query.rb
+++ b/modules/auxiliary/scanner/http/blind_sql_query.rb
@@ -469,5 +469,4 @@ class MetasploitModule < Msf::Auxiliary
return false
end
-
end
diff --git a/modules/auxiliary/scanner/http/cert.rb b/modules/auxiliary/scanner/http/cert.rb
index 4497bfd08d..8ee7afb04c 100644
--- a/modules/auxiliary/scanner/http/cert.rb
+++ b/modules/auxiliary/scanner/http/cert.rb
@@ -109,5 +109,4 @@ class MetasploitModule < Msf::Auxiliary
return if(e.to_s =~ /execution expired/)
print_error("Error: '#{ip}' '#{e.class}' '#{e}' '#{e.backtrace}'")
end
-
end
diff --git a/modules/auxiliary/scanner/http/chef_webui_login.rb b/modules/auxiliary/scanner/http/chef_webui_login.rb
index 6e2797c382..6597b40543 100644
--- a/modules/auxiliary/scanner/http/chef_webui_login.rb
+++ b/modules/auxiliary/scanner/http/chef_webui_login.rb
@@ -155,5 +155,4 @@ class MetasploitModule < Msf::Auxiliary
)
)
end
-
end
diff --git a/modules/auxiliary/scanner/http/chromecast_webserver.rb b/modules/auxiliary/scanner/http/chromecast_webserver.rb
index 1dbec0520b..c0b316b68f 100644
--- a/modules/auxiliary/scanner/http/chromecast_webserver.rb
+++ b/modules/auxiliary/scanner/http/chromecast_webserver.rb
@@ -56,5 +56,4 @@ class MetasploitModule < Msf::Auxiliary
)
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/chromecast_wifi.rb b/modules/auxiliary/scanner/http/chromecast_wifi.rb
index 08602f7056..6544e9f186 100644
--- a/modules/auxiliary/scanner/http/chromecast_wifi.rb
+++ b/modules/auxiliary/scanner/http/chromecast_wifi.rb
@@ -119,5 +119,4 @@ class MetasploitModule < Msf::Auxiliary
''
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/cisco_device_manager.rb b/modules/auxiliary/scanner/http/cisco_device_manager.rb
index 33fb610321..c9fd5e35e0 100644
--- a/modules/auxiliary/scanner/http/cisco_device_manager.rb
+++ b/modules/auxiliary/scanner/http/cisco_device_manager.rb
@@ -88,5 +88,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/cisco_firepower_download.rb b/modules/auxiliary/scanner/http/cisco_firepower_download.rb
index 745ef23d62..344c181554 100644
--- a/modules/auxiliary/scanner/http/cisco_firepower_download.rb
+++ b/modules/auxiliary/scanner/http/cisco_firepower_download.rb
@@ -161,5 +161,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("Remote file not found: #{datastore['FILEPATH']}")
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/cisco_firepower_login.rb b/modules/auxiliary/scanner/http/cisco_firepower_login.rb
index 0c3d564ddf..19a3e45f59 100644
--- a/modules/auxiliary/scanner/http/cisco_firepower_login.rb
+++ b/modules/auxiliary/scanner/http/cisco_firepower_login.rb
@@ -137,5 +137,4 @@ class MetasploitModule < Msf::Auxiliary
bruteforce(ip)
end
-
end
diff --git a/modules/auxiliary/scanner/http/cisco_ios_auth_bypass.rb b/modules/auxiliary/scanner/http/cisco_ios_auth_bypass.rb
index 75b7c99736..72038f7cb7 100644
--- a/modules/auxiliary/scanner/http/cisco_ios_auth_bypass.rb
+++ b/modules/auxiliary/scanner/http/cisco_ios_auth_bypass.rb
@@ -87,5 +87,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb b/modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb
index 7d5b143c10..747d3c883b 100644
--- a/modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb
+++ b/modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb
@@ -272,5 +272,4 @@ class MetasploitModule < Msf::Auxiliary
login_data.merge!(service_data)
create_credential_login(login_data)
end
-
end
diff --git a/modules/auxiliary/scanner/http/clansphere_traversal.rb b/modules/auxiliary/scanner/http/clansphere_traversal.rb
index 9bbba6d6d8..3cac9d44c5 100644
--- a/modules/auxiliary/scanner/http/clansphere_traversal.rb
+++ b/modules/auxiliary/scanner/http/clansphere_traversal.rb
@@ -81,5 +81,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("Fail to obtain file for some unknown reason")
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb b/modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb
index 90c0692f1b..4b0f5e052e 100644
--- a/modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb
+++ b/modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb
@@ -191,7 +191,6 @@ class MetasploitModule < Msf::Auxiliary
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::ArgumentError
rescue ::Timeout::Error, ::Errno::EPIPE
end
-
end
# URLs that may work for you:
diff --git a/modules/auxiliary/scanner/http/coldfusion_version.rb b/modules/auxiliary/scanner/http/coldfusion_version.rb
index a5f9e040d6..ce0e714379 100644
--- a/modules/auxiliary/scanner/http/coldfusion_version.rb
+++ b/modules/auxiliary/scanner/http/coldfusion_version.rb
@@ -120,5 +120,4 @@ class MetasploitModule < Msf::Auxiliary
rescue Errno::ENOPROTOOPT, Errno::ECONNRESET, ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::ArgumentError
rescue ::Timeout::Error, ::Errno::EPIPE
end
-
end
diff --git a/modules/auxiliary/scanner/http/dell_idrac.rb b/modules/auxiliary/scanner/http/dell_idrac.rb
index d6643c36e9..a3a22a6edc 100644
--- a/modules/auxiliary/scanner/http/dell_idrac.rb
+++ b/modules/auxiliary/scanner/http/dell_idrac.rb
@@ -136,5 +136,4 @@ class MetasploitModule < Msf::Auxiliary
return if(e.to_s.match(/^SSL_connect /) ) # strange errors / exception if SSL connection aborted
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/dlink_dir_300_615_http_login.rb b/modules/auxiliary/scanner/http/dlink_dir_300_615_http_login.rb
index 238797cf27..89dfd454e8 100644
--- a/modules/auxiliary/scanner/http/dlink_dir_300_615_http_login.rb
+++ b/modules/auxiliary/scanner/http/dlink_dir_300_615_http_login.rb
@@ -153,5 +153,4 @@ class MetasploitModule < Msf::Auxiliary
end
return :fail
end
-
end
diff --git a/modules/auxiliary/scanner/http/dlink_dir_615h_http_login.rb b/modules/auxiliary/scanner/http/dlink_dir_615h_http_login.rb
index f5c0b8fad5..b5820c1c86 100644
--- a/modules/auxiliary/scanner/http/dlink_dir_615h_http_login.rb
+++ b/modules/auxiliary/scanner/http/dlink_dir_615h_http_login.rb
@@ -169,5 +169,4 @@ class MetasploitModule < Msf::Auxiliary
end
return :fail
end
-
end
diff --git a/modules/auxiliary/scanner/http/dlink_dir_session_cgi_http_login.rb b/modules/auxiliary/scanner/http/dlink_dir_session_cgi_http_login.rb
index 10d1e331f2..12b545e0bf 100644
--- a/modules/auxiliary/scanner/http/dlink_dir_session_cgi_http_login.rb
+++ b/modules/auxiliary/scanner/http/dlink_dir_session_cgi_http_login.rb
@@ -159,5 +159,4 @@ class MetasploitModule < Msf::Auxiliary
end
return :fail
end
-
end
diff --git a/modules/auxiliary/scanner/http/dnalims_file_retrieve.rb b/modules/auxiliary/scanner/http/dnalims_file_retrieve.rb
index fc5e368ff2..8c575d7f3a 100644
--- a/modules/auxiliary/scanner/http/dnalims_file_retrieve.rb
+++ b/modules/auxiliary/scanner/http/dnalims_file_retrieve.rb
@@ -72,7 +72,6 @@ class MetasploitModule < Msf::Auxiliary
p = store_loot('dnaLIMS.traversal.file', 'application/octet-stream', ip, res.body, File.basename(file))
print_good("File saved as: #{p}")
end
-
end
diff --git a/modules/auxiliary/scanner/http/drupal_views_user_enum.rb b/modules/auxiliary/scanner/http/drupal_views_user_enum.rb
index 89322bde69..a8c57236b8 100644
--- a/modules/auxiliary/scanner/http/drupal_views_user_enum.rb
+++ b/modules/auxiliary/scanner/http/drupal_views_user_enum.rb
@@ -146,5 +146,4 @@ class MetasploitModule < Msf::Auxiliary
)
print_status("Usernames stored in: #{p}")
end
-
end
diff --git a/modules/auxiliary/scanner/http/ektron_cms400net.rb b/modules/auxiliary/scanner/http/ektron_cms400net.rb
index e505586d81..15954f3f4b 100644
--- a/modules/auxiliary/scanner/http/ektron_cms400net.rb
+++ b/modules/auxiliary/scanner/http/ektron_cms400net.rb
@@ -182,5 +182,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/frontpage_login.rb b/modules/auxiliary/scanner/http/frontpage_login.rb
index a8f47c302b..6644b78f1a 100644
--- a/modules/auxiliary/scanner/http/frontpage_login.rb
+++ b/modules/auxiliary/scanner/http/frontpage_login.rb
@@ -143,5 +143,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
-
end
diff --git a/modules/auxiliary/scanner/http/glassfish_login.rb b/modules/auxiliary/scanner/http/glassfish_login.rb
index 04faec5783..6408a0f598 100644
--- a/modules/auxiliary/scanner/http/glassfish_login.rb
+++ b/modules/auxiliary/scanner/http/glassfish_login.rb
@@ -188,5 +188,4 @@ class MetasploitModule < Msf::Auxiliary
bruteforce(ip) unless @scanner.version.blank?
end
-
end
diff --git a/modules/auxiliary/scanner/http/host_header_injection.rb b/modules/auxiliary/scanner/http/host_header_injection.rb
index dd77859eb0..69461a767d 100644
--- a/modules/auxiliary/scanner/http/host_header_injection.rb
+++ b/modules/auxiliary/scanner/http/host_header_injection.rb
@@ -65,5 +65,4 @@ class MetasploitModule < Msf::Auxiliary
rescue ::Timeout::Error, ::Errno::EPIPE
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess.rb b/modules/auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess.rb
index 7fee6603e1..f3bee086eb 100644
--- a/modules/auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess.rb
+++ b/modules/auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess.rb
@@ -177,6 +177,5 @@ class MetasploitModule < Msf::Auxiliary
print_error("Failed to retrieve the file contents")
end
-
end
diff --git a/modules/auxiliary/scanner/http/hp_sitescope_getsitescopeconfiguration.rb b/modules/auxiliary/scanner/http/hp_sitescope_getsitescopeconfiguration.rb
index 092ac47aa6..13f5836bbe 100644
--- a/modules/auxiliary/scanner/http/hp_sitescope_getsitescopeconfiguration.rb
+++ b/modules/auxiliary/scanner/http/hp_sitescope_getsitescopeconfiguration.rb
@@ -128,6 +128,5 @@ class MetasploitModule < Msf::Auxiliary
print_error("Failed to retrieve the SiteScope Configuration")
end
-
end
diff --git a/modules/auxiliary/scanner/http/hp_sitescope_loadfilecontent_fileaccess.rb b/modules/auxiliary/scanner/http/hp_sitescope_loadfilecontent_fileaccess.rb
index ccd71769f2..1263135c79 100644
--- a/modules/auxiliary/scanner/http/hp_sitescope_loadfilecontent_fileaccess.rb
+++ b/modules/auxiliary/scanner/http/hp_sitescope_loadfilecontent_fileaccess.rb
@@ -112,6 +112,5 @@ class MetasploitModule < Msf::Auxiliary
print_error("Failed to retrieve the file")
end
-
end
diff --git a/modules/auxiliary/scanner/http/http_header.rb b/modules/auxiliary/scanner/http/http_header.rb
index b88dfd792e..e2dd208aae 100644
--- a/modules/auxiliary/scanner/http/http_header.rb
+++ b/modules/auxiliary/scanner/http/http_header.rb
@@ -87,5 +87,4 @@ class MetasploitModule < Msf::Auxiliary
print_good "#{peer}: detected #{counter} headers"
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/http_hsts.rb b/modules/auxiliary/scanner/http/http_hsts.rb
index 727a74fec2..2e7415388a 100644
--- a/modules/auxiliary/scanner/http/http_hsts.rb
+++ b/modules/auxiliary/scanner/http/http_hsts.rb
@@ -51,5 +51,4 @@ class MetasploitModule < Msf::Auxiliary
rescue ::Timeout::Error, ::Errno::EPIPE
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/http_put.rb b/modules/auxiliary/scanner/http/http_put.rb
index 4d4b539486..d7f413d4db 100644
--- a/modules/auxiliary/scanner/http/http_put.rb
+++ b/modules/auxiliary/scanner/http/http_put.rb
@@ -185,5 +185,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/http_version.rb b/modules/auxiliary/scanner/http/http_version.rb
index 0929c752ea..0259f62e88 100644
--- a/modules/auxiliary/scanner/http/http_version.rb
+++ b/modules/auxiliary/scanner/http/http_version.rb
@@ -40,5 +40,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/infovista_enum.rb b/modules/auxiliary/scanner/http/infovista_enum.rb
index e9c1b5ec20..7de02638a2 100644
--- a/modules/auxiliary/scanner/http/infovista_enum.rb
+++ b/modules/auxiliary/scanner/http/infovista_enum.rb
@@ -134,5 +134,4 @@ class MetasploitModule < Msf::Auxiliary
return :abort
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/intel_amt_digest_bypass.rb b/modules/auxiliary/scanner/http/intel_amt_digest_bypass.rb
index 747bd07265..240e539fd8 100644
--- a/modules/auxiliary/scanner/http/intel_amt_digest_bypass.rb
+++ b/modules/auxiliary/scanner/http/intel_amt_digest_bypass.rb
@@ -113,5 +113,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/ipboard_login.rb b/modules/auxiliary/scanner/http/ipboard_login.rb
index ed2a68431a..b469494b49 100644
--- a/modules/auxiliary/scanner/http/ipboard_login.rb
+++ b/modules/auxiliary/scanner/http/ipboard_login.rb
@@ -79,5 +79,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/joomla_bruteforce_login.rb b/modules/auxiliary/scanner/http/joomla_bruteforce_login.rb
index bbd87a5326..c9fa42e5cc 100644
--- a/modules/auxiliary/scanner/http/joomla_bruteforce_login.rb
+++ b/modules/auxiliary/scanner/http/joomla_bruteforce_login.rb
@@ -289,5 +289,4 @@ class MetasploitModule < Msf::Auxiliary
valor_input_id
end
-
end
diff --git a/modules/auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner.rb b/modules/auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner.rb
index 69073a6b62..3b30ead6ca 100644
--- a/modules/auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner.rb
+++ b/modules/auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner.rb
@@ -84,5 +84,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/joomla_gallerywd_sqli_scanner.rb b/modules/auxiliary/scanner/http/joomla_gallerywd_sqli_scanner.rb
index ad7c18d9fe..7816de7d98 100644
--- a/modules/auxiliary/scanner/http/joomla_gallerywd_sqli_scanner.rb
+++ b/modules/auxiliary/scanner/http/joomla_gallerywd_sqli_scanner.rb
@@ -101,5 +101,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/joomla_pages.rb b/modules/auxiliary/scanner/http/joomla_pages.rb
index 0c020e2172..38b3ee830e 100644
--- a/modules/auxiliary/scanner/http/joomla_pages.rb
+++ b/modules/auxiliary/scanner/http/joomla_pages.rb
@@ -97,5 +97,4 @@ class MetasploitModule < Msf::Auxiliary
vprint_error("Timeout error")
return
end
-
end
diff --git a/modules/auxiliary/scanner/http/joomla_plugins.rb b/modules/auxiliary/scanner/http/joomla_plugins.rb
index 4c9d8ac97a..90d8ed5f48 100644
--- a/modules/auxiliary/scanner/http/joomla_plugins.rb
+++ b/modules/auxiliary/scanner/http/joomla_plugins.rb
@@ -163,5 +163,4 @@ class MetasploitModule < Msf::Auxiliary
vprint_error("Timeout error")
return
end
-
end
diff --git a/modules/auxiliary/scanner/http/joomla_version.rb b/modules/auxiliary/scanner/http/joomla_version.rb
index 32c339f661..23591db348 100644
--- a/modules/auxiliary/scanner/http/joomla_version.rb
+++ b/modules/auxiliary/scanner/http/joomla_version.rb
@@ -65,5 +65,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("Unable to find Joomla version.")
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/kodi_traversal.rb b/modules/auxiliary/scanner/http/kodi_traversal.rb
index d3adb3ca2e..2e1c1a882d 100644
--- a/modules/auxiliary/scanner/http/kodi_traversal.rb
+++ b/modules/auxiliary/scanner/http/kodi_traversal.rb
@@ -77,5 +77,4 @@ class MetasploitModule < Msf::Auxiliary
print_error('Fail to obtain file for some unknown reason')
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/litespeed_source_disclosure.rb b/modules/auxiliary/scanner/http/litespeed_source_disclosure.rb
index dfca196b80..e0117c859f 100644
--- a/modules/auxiliary/scanner/http/litespeed_source_disclosure.rb
+++ b/modules/auxiliary/scanner/http/litespeed_source_disclosure.rb
@@ -93,5 +93,4 @@ class MetasploitModule < Msf::Auxiliary
rescue ::Timeout::Error, ::Errno::EPIPE
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/lucky_punch.rb b/modules/auxiliary/scanner/http/lucky_punch.rb
index 9d8985afe8..24d64b9d76 100644
--- a/modules/auxiliary/scanner/http/lucky_punch.rb
+++ b/modules/auxiliary/scanner/http/lucky_punch.rb
@@ -88,5 +88,4 @@ EOF
print_status("Request sent.")
end
-
end
diff --git a/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb b/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb
index c732a88614..f1b448f94a 100644
--- a/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb
+++ b/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb
@@ -98,5 +98,4 @@ class MetasploitModule < Msf::Auxiliary
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout
rescue ::Timeout::Error, ::Errno::EPIPE
end
-
end
diff --git a/modules/auxiliary/scanner/http/manageengine_desktop_central_login.rb b/modules/auxiliary/scanner/http/manageengine_desktop_central_login.rb
index 4f4be8bcc0..092cfd3881 100644
--- a/modules/auxiliary/scanner/http/manageengine_desktop_central_login.rb
+++ b/modules/auxiliary/scanner/http/manageengine_desktop_central_login.rb
@@ -129,5 +129,4 @@ class MetasploitModule < Msf::Auxiliary
bruteforce(ip)
end
-
end
diff --git a/modules/auxiliary/scanner/http/manageengine_deviceexpert_traversal.rb b/modules/auxiliary/scanner/http/manageengine_deviceexpert_traversal.rb
index e409a345a8..61b89876bc 100644
--- a/modules/auxiliary/scanner/http/manageengine_deviceexpert_traversal.rb
+++ b/modules/auxiliary/scanner/http/manageengine_deviceexpert_traversal.rb
@@ -71,5 +71,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("#{ip}:#{rport} - File saved in: #{path}")
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/manageengine_securitymanager_traversal.rb b/modules/auxiliary/scanner/http/manageengine_securitymanager_traversal.rb
index b395cbf79a..df5eccdeaf 100644
--- a/modules/auxiliary/scanner/http/manageengine_securitymanager_traversal.rb
+++ b/modules/auxiliary/scanner/http/manageengine_securitymanager_traversal.rb
@@ -83,5 +83,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("Fail to obtain file for some unknown reason")
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/mediawiki_svg_fileaccess.rb b/modules/auxiliary/scanner/http/mediawiki_svg_fileaccess.rb
index f9e16f9846..df5b17000d 100644
--- a/modules/auxiliary/scanner/http/mediawiki_svg_fileaccess.rb
+++ b/modules/auxiliary/scanner/http/mediawiki_svg_fileaccess.rb
@@ -278,5 +278,4 @@ class MetasploitModule < Msf::Auxiliary
def run_host(ip)
accessfile(ip)
end
-
end
diff --git a/modules/auxiliary/scanner/http/nginx_source_disclosure.rb b/modules/auxiliary/scanner/http/nginx_source_disclosure.rb
index 6ef02bc239..bd4fc44385 100644
--- a/modules/auxiliary/scanner/http/nginx_source_disclosure.rb
+++ b/modules/auxiliary/scanner/http/nginx_source_disclosure.rb
@@ -102,5 +102,4 @@ class MetasploitModule < Msf::Auxiliary
rescue ::Timeout::Error, ::Errno::EPIPE
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/novell_file_reporter_fsfui_fileaccess.rb b/modules/auxiliary/scanner/http/novell_file_reporter_fsfui_fileaccess.rb
index 04efa0cfa8..b16d4a0ce0 100644
--- a/modules/auxiliary/scanner/http/novell_file_reporter_fsfui_fileaccess.rb
+++ b/modules/auxiliary/scanner/http/novell_file_reporter_fsfui_fileaccess.rb
@@ -68,6 +68,5 @@ class MetasploitModule < Msf::Auxiliary
print_error("Failed to retrieve the file contents")
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/novell_file_reporter_srs_fileaccess.rb b/modules/auxiliary/scanner/http/novell_file_reporter_srs_fileaccess.rb
index ed0d598100..39222cc311 100644
--- a/modules/auxiliary/scanner/http/novell_file_reporter_srs_fileaccess.rb
+++ b/modules/auxiliary/scanner/http/novell_file_reporter_srs_fileaccess.rb
@@ -68,6 +68,5 @@ class MetasploitModule < Msf::Auxiliary
print_error("Failed to retrieve the file contents")
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/novell_mdm_creds.rb b/modules/auxiliary/scanner/http/novell_mdm_creds.rb
index 4ec01aed16..97e2cd5f47 100644
--- a/modules/auxiliary/scanner/http/novell_mdm_creds.rb
+++ b/modules/auxiliary/scanner/http/novell_mdm_creds.rb
@@ -132,5 +132,4 @@ class MetasploitModule < Msf::Auxiliary
return if(e.to_s.match(/^SSL_connect /) ) # strange errors / exception if SSL connection aborted
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/ntlm_info_enumeration.rb b/modules/auxiliary/scanner/http/ntlm_info_enumeration.rb
index 1eb0779b23..22ec3a42c9 100644
--- a/modules/auxiliary/scanner/http/ntlm_info_enumeration.rb
+++ b/modules/auxiliary/scanner/http/ntlm_info_enumeration.rb
@@ -134,5 +134,4 @@ class MetasploitModule < Msf::Auxiliary
:new_offset => offset + size
}
end
-
end
diff --git a/modules/auxiliary/scanner/http/oracle_demantra_database_credentials_leak.rb b/modules/auxiliary/scanner/http/oracle_demantra_database_credentials_leak.rb
index 91199dfefb..a5de1116b4 100644
--- a/modules/auxiliary/scanner/http/oracle_demantra_database_credentials_leak.rb
+++ b/modules/auxiliary/scanner/http/oracle_demantra_database_credentials_leak.rb
@@ -71,5 +71,4 @@ class MetasploitModule < Msf::Auxiliary
print_good("Credentials decoded: #{creds}") unless creds.empty?
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/owa_login.rb b/modules/auxiliary/scanner/http/owa_login.rb
index bd4330172c..6059e718f8 100644
--- a/modules/auxiliary/scanner/http/owa_login.rb
+++ b/modules/auxiliary/scanner/http/owa_login.rb
@@ -406,5 +406,4 @@ class MetasploitModule < Msf::Auxiliary
def msg
"#{vhost}:#{rport} OWA -"
end
-
end
diff --git a/modules/auxiliary/scanner/http/rails_json_yaml_scanner.rb b/modules/auxiliary/scanner/http/rails_json_yaml_scanner.rb
index 7770d7f7bf..173bc29684 100644
--- a/modules/auxiliary/scanner/http/rails_json_yaml_scanner.rb
+++ b/modules/auxiliary/scanner/http/rails_json_yaml_scanner.rb
@@ -92,5 +92,4 @@ class MetasploitModule < Msf::Auxiliary
vprint_status("#{rhost}:#{rport} is not likely to be vulnerable or TARGETURI & HTTP_METHOD must be set")
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/rails_xml_yaml_scanner.rb b/modules/auxiliary/scanner/http/rails_xml_yaml_scanner.rb
index 75f2b257bd..71dc3f7331 100644
--- a/modules/auxiliary/scanner/http/rails_xml_yaml_scanner.rb
+++ b/modules/auxiliary/scanner/http/rails_xml_yaml_scanner.rb
@@ -87,5 +87,4 @@ class MetasploitModule < Msf::Auxiliary
vprint_status("#{rhost}:#{rport} is not likely to be vulnerable or URIPATH & HTTP_METHOD must be set")
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/replace_ext.rb b/modules/auxiliary/scanner/http/replace_ext.rb
index 5e92862e2a..95ae881adb 100644
--- a/modules/auxiliary/scanner/http/replace_ext.rb
+++ b/modules/auxiliary/scanner/http/replace_ext.rb
@@ -175,5 +175,4 @@ class MetasploitModule < Msf::Auxiliary
}
end
-
end
diff --git a/modules/auxiliary/scanner/http/riverbed_steelhead_vcx_file_read.rb b/modules/auxiliary/scanner/http/riverbed_steelhead_vcx_file_read.rb
index 46fb607b27..49af26f702 100644
--- a/modules/auxiliary/scanner/http/riverbed_steelhead_vcx_file_read.rb
+++ b/modules/auxiliary/scanner/http/riverbed_steelhead_vcx_file_read.rb
@@ -125,5 +125,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/smt_ipmi_49152_exposure.rb b/modules/auxiliary/scanner/http/smt_ipmi_49152_exposure.rb
index 4af8a3fa8c..63c6fa44c9 100644
--- a/modules/auxiliary/scanner/http/smt_ipmi_49152_exposure.rb
+++ b/modules/auxiliary/scanner/http/smt_ipmi_49152_exposure.rb
@@ -98,5 +98,4 @@ class MetasploitModule < Msf::Auxiliary
print_good("Password data from #{uri} stored to #{path}")
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/smt_ipmi_cgi_scanner.rb b/modules/auxiliary/scanner/http/smt_ipmi_cgi_scanner.rb
index 05c28a2b4d..830171affb 100644
--- a/modules/auxiliary/scanner/http/smt_ipmi_cgi_scanner.rb
+++ b/modules/auxiliary/scanner/http/smt_ipmi_cgi_scanner.rb
@@ -152,5 +152,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/smt_ipmi_static_cert_scanner.rb b/modules/auxiliary/scanner/http/smt_ipmi_static_cert_scanner.rb
index a2791fbd5c..0f17e4a51e 100644
--- a/modules/auxiliary/scanner/http/smt_ipmi_static_cert_scanner.rb
+++ b/modules/auxiliary/scanner/http/smt_ipmi_static_cert_scanner.rb
@@ -92,5 +92,4 @@ class MetasploitModule < Msf::Auxiliary
})
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/smt_ipmi_url_redirect_traversal.rb b/modules/auxiliary/scanner/http/smt_ipmi_url_redirect_traversal.rb
index dcaadd0495..a61ab70a27 100644
--- a/modules/auxiliary/scanner/http/smt_ipmi_url_redirect_traversal.rb
+++ b/modules/auxiliary/scanner/http/smt_ipmi_url_redirect_traversal.rb
@@ -142,5 +142,4 @@ class MetasploitModule < Msf::Auxiliary
)
print_good("File saved in: #{path}")
end
-
end
diff --git a/modules/auxiliary/scanner/http/splunk_web_login.rb b/modules/auxiliary/scanner/http/splunk_web_login.rb
index 3be95b4808..df1b0ac512 100644
--- a/modules/auxiliary/scanner/http/splunk_web_login.rb
+++ b/modules/auxiliary/scanner/http/splunk_web_login.rb
@@ -198,5 +198,4 @@ class MetasploitModule < Msf::Auxiliary
return :abort
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/ssl_version.rb b/modules/auxiliary/scanner/http/ssl_version.rb
index 2438ed200b..e4f5d00a68 100644
--- a/modules/auxiliary/scanner/http/ssl_version.rb
+++ b/modules/auxiliary/scanner/http/ssl_version.rb
@@ -77,5 +77,4 @@ class MetasploitModule < Msf::Auxiliary
:exploited_at => Time.now.utc
)
end
-
end
diff --git a/modules/auxiliary/scanner/http/svn_wcdb_scanner.rb b/modules/auxiliary/scanner/http/svn_wcdb_scanner.rb
index d40ebed0cd..30ee054971 100644
--- a/modules/auxiliary/scanner/http/svn_wcdb_scanner.rb
+++ b/modules/auxiliary/scanner/http/svn_wcdb_scanner.rb
@@ -78,5 +78,4 @@ class MetasploitModule < Msf::Auxiliary
rescue ::Timeout::Error, ::Errno::EPIPE
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/symantec_brightmail_logfile.rb b/modules/auxiliary/scanner/http/symantec_brightmail_logfile.rb
index 0f289890d0..0a38b25b62 100644
--- a/modules/auxiliary/scanner/http/symantec_brightmail_logfile.rb
+++ b/modules/auxiliary/scanner/http/symantec_brightmail_logfile.rb
@@ -143,5 +143,4 @@ class MetasploitModule < Msf::Auxiliary
fname = datastore['FILENAME']
download_file(sid, fname)
end
-
end
diff --git a/modules/auxiliary/scanner/http/symantec_web_gateway_login.rb b/modules/auxiliary/scanner/http/symantec_web_gateway_login.rb
index bcc075803e..2c0d585ec7 100644
--- a/modules/auxiliary/scanner/http/symantec_web_gateway_login.rb
+++ b/modules/auxiliary/scanner/http/symantec_web_gateway_login.rb
@@ -132,5 +132,4 @@ class MetasploitModule < Msf::Auxiliary
bruteforce(ip)
end
-
end
diff --git a/modules/auxiliary/scanner/http/titan_ftp_admin_pwd.rb b/modules/auxiliary/scanner/http/titan_ftp_admin_pwd.rb
index cbb3e4f1c7..8398d70186 100644
--- a/modules/auxiliary/scanner/http/titan_ftp_admin_pwd.rb
+++ b/modules/auxiliary/scanner/http/titan_ftp_admin_pwd.rb
@@ -120,5 +120,4 @@ class MetasploitModule < Msf::Auxiliary
create_credential_login(login_data)
end
-
end
diff --git a/modules/auxiliary/scanner/http/tomcat_enum.rb b/modules/auxiliary/scanner/http/tomcat_enum.rb
index 99806a2067..d8c4da4b2f 100644
--- a/modules/auxiliary/scanner/http/tomcat_enum.rb
+++ b/modules/auxiliary/scanner/http/tomcat_enum.rb
@@ -113,7 +113,6 @@ class MetasploitModule < Msf::Auxiliary
return :abort
end
end
-
end
=begin
diff --git a/modules/auxiliary/scanner/http/tomcat_mgr_login.rb b/modules/auxiliary/scanner/http/tomcat_mgr_login.rb
index e00e65d3a1..37feaedb7e 100644
--- a/modules/auxiliary/scanner/http/tomcat_mgr_login.rb
+++ b/modules/auxiliary/scanner/http/tomcat_mgr_login.rb
@@ -138,5 +138,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/verb_auth_bypass.rb b/modules/auxiliary/scanner/http/verb_auth_bypass.rb
index b631a4525f..531166efad 100644
--- a/modules/auxiliary/scanner/http/verb_auth_bypass.rb
+++ b/modules/auxiliary/scanner/http/verb_auth_bypass.rb
@@ -92,5 +92,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/webpagetest_traversal.rb b/modules/auxiliary/scanner/http/webpagetest_traversal.rb
index 435b8ad255..f54f31a6d5 100644
--- a/modules/auxiliary/scanner/http/webpagetest_traversal.rb
+++ b/modules/auxiliary/scanner/http/webpagetest_traversal.rb
@@ -69,5 +69,4 @@ class MetasploitModule < Msf::Auxiliary
p = store_loot('webpagetest.traversal.file', 'application/octet-stream', ip, res.body, File.basename(file))
print_good("File saved as: #{p}")
end
-
end
diff --git a/modules/auxiliary/scanner/http/wordpress_content_injection.rb b/modules/auxiliary/scanner/http/wordpress_content_injection.rb
index 3c7c4bdc6f..d59d9b4377 100644
--- a/modules/auxiliary/scanner/http/wordpress_content_injection.rb
+++ b/modules/auxiliary/scanner/http/wordpress_content_injection.rb
@@ -212,5 +212,4 @@ class MetasploitModule < Msf::Auxiliary
def route_rest_api(rest_api)
normalize_uri(path_from_uri(rest_api), 'wp/v2')
end
-
end
diff --git a/modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb b/modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb
index 665beb9a58..2b2cfb7921 100644
--- a/modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb
+++ b/modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb
@@ -81,5 +81,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("target not vulnerable to GHOST")
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/wordpress_multicall_creds.rb b/modules/auxiliary/scanner/http/wordpress_multicall_creds.rb
index 454884425c..935f439b01 100644
--- a/modules/auxiliary/scanner/http/wordpress_multicall_creds.rb
+++ b/modules/auxiliary/scanner/http/wordpress_multicall_creds.rb
@@ -133,5 +133,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/wordpress_xmlrpc_login.rb b/modules/auxiliary/scanner/http/wordpress_xmlrpc_login.rb
index fd48dd105f..bde26bf3f4 100644
--- a/modules/auxiliary/scanner/http/wordpress_xmlrpc_login.rb
+++ b/modules/auxiliary/scanner/http/wordpress_xmlrpc_login.rb
@@ -102,5 +102,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/http/zabbix_login.rb b/modules/auxiliary/scanner/http/zabbix_login.rb
index fae4332e9e..fd21ea1924 100644
--- a/modules/auxiliary/scanner/http/zabbix_login.rb
+++ b/modules/auxiliary/scanner/http/zabbix_login.rb
@@ -170,5 +170,4 @@ class MetasploitModule < Msf::Auxiliary
res = send_request_cgi({'uri'=>dashboard_uri})
!! (res && res.code == 200 && res.body.to_s =~ /
Zabbix .*: Dashboard<\/title>/)
end
-
end
diff --git a/modules/auxiliary/scanner/http/zenworks_assetmanagement_getconfig.rb b/modules/auxiliary/scanner/http/zenworks_assetmanagement_getconfig.rb
index b1e85f4a4e..173afb9920 100644
--- a/modules/auxiliary/scanner/http/zenworks_assetmanagement_getconfig.rb
+++ b/modules/auxiliary/scanner/http/zenworks_assetmanagement_getconfig.rb
@@ -65,5 +65,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/ike/cisco_ike_benigncertain.rb b/modules/auxiliary/scanner/ike/cisco_ike_benigncertain.rb
index 8ab3572b98..76b7d1ebf4 100644
--- a/modules/auxiliary/scanner/ike/cisco_ike_benigncertain.rb
+++ b/modules/auxiliary/scanner/ike/cisco_ike_benigncertain.rb
@@ -93,5 +93,4 @@ class MetasploitModule < Msf::Auxiliary
udp_sock.close
end
end
-
end
diff --git a/modules/auxiliary/scanner/imap/imap_version.rb b/modules/auxiliary/scanner/imap/imap_version.rb
index d5fe1fc1ef..429d0ef92d 100644
--- a/modules/auxiliary/scanner/imap/imap_version.rb
+++ b/modules/auxiliary/scanner/imap/imap_version.rb
@@ -30,5 +30,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("#{ip}:#{rport} - #{e} #{e.backtrace}")
end
end
-
end
diff --git a/modules/auxiliary/scanner/ip/ipidseq.rb b/modules/auxiliary/scanner/ip/ipidseq.rb
index 80e53e4146..daf9d35d64 100644
--- a/modules/auxiliary/scanner/ip/ipidseq.rb
+++ b/modules/auxiliary/scanner/ip/ipidseq.rb
@@ -186,5 +186,4 @@ class MetasploitModule < Msf::Auxiliary
return reply
end
-
end
diff --git a/modules/auxiliary/scanner/ipmi/ipmi_version.rb b/modules/auxiliary/scanner/ipmi/ipmi_version.rb
index dbced31f70..4dfcc13a18 100644
--- a/modules/auxiliary/scanner/ipmi/ipmi_version.rb
+++ b/modules/auxiliary/scanner/ipmi/ipmi_version.rb
@@ -75,5 +75,4 @@ class MetasploitModule < Msf::Auxiliary
# - Report a vulnerability if info.ipmi_user_null has been set (null username)
end
-
end
diff --git a/modules/auxiliary/scanner/misc/cctv_dvr_login.rb b/modules/auxiliary/scanner/misc/cctv_dvr_login.rb
index 46333a8da1..03ffe57a65 100644
--- a/modules/auxiliary/scanner/misc/cctv_dvr_login.rb
+++ b/modules/auxiliary/scanner/misc/cctv_dvr_login.rb
@@ -214,5 +214,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/misc/dvr_config_disclosure.rb b/modules/auxiliary/scanner/misc/dvr_config_disclosure.rb
index c7a2a1ec7d..ca23e85fe1 100644
--- a/modules/auxiliary/scanner/misc/dvr_config_disclosure.rb
+++ b/modules/auxiliary/scanner/misc/dvr_config_disclosure.rb
@@ -263,5 +263,4 @@ class MetasploitModule < Msf::Auxiliary
report_service(:host => rhost, :port => rport, :sname => 'dvr', :info => "DVR NAME: #{dvr_name}")
print_good("#{rhost}:#{rport} DVR #{dvr_name} found")
end
-
end
diff --git a/modules/auxiliary/scanner/misc/ib_service_mgr_info.rb b/modules/auxiliary/scanner/misc/ib_service_mgr_info.rb
index 4506220c94..c6f75f483b 100644
--- a/modules/auxiliary/scanner/misc/ib_service_mgr_info.rb
+++ b/modules/auxiliary/scanner/misc/ib_service_mgr_info.rb
@@ -233,5 +233,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/misc/java_rmi_server.rb b/modules/auxiliary/scanner/misc/java_rmi_server.rb
index ed04fc3bd1..738760e369 100644
--- a/modules/auxiliary/scanner/misc/java_rmi_server.rb
+++ b/modules/auxiliary/scanner/misc/java_rmi_server.rb
@@ -176,5 +176,4 @@ class MetasploitModule < Msf::Auxiliary
arguments
end
-
end
diff --git a/modules/auxiliary/scanner/misc/poisonivy_control_scanner.rb b/modules/auxiliary/scanner/misc/poisonivy_control_scanner.rb
index 594c2de34a..321e0d8b32 100644
--- a/modules/auxiliary/scanner/misc/poisonivy_control_scanner.rb
+++ b/modules/auxiliary/scanner/misc/poisonivy_control_scanner.rb
@@ -89,5 +89,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/misc/raysharp_dvr_passwords.rb b/modules/auxiliary/scanner/misc/raysharp_dvr_passwords.rb
index 35836ddf15..3c88b30b6b 100644
--- a/modules/auxiliary/scanner/misc/raysharp_dvr_passwords.rb
+++ b/modules/auxiliary/scanner/misc/raysharp_dvr_passwords.rb
@@ -128,5 +128,4 @@ class MetasploitModule < Msf::Auxiliary
report_service(:host => rhost, :port => rport, :sname => 'dvr', :info => info)
print_good("#{rhost}:#{rport} #{info}")
end
-
end
diff --git a/modules/auxiliary/scanner/misc/rosewill_rxs3211_passwords.rb b/modules/auxiliary/scanner/misc/rosewill_rxs3211_passwords.rb
index 366c8940ca..cd12ce3f4c 100644
--- a/modules/auxiliary/scanner/misc/rosewill_rxs3211_passwords.rb
+++ b/modules/auxiliary/scanner/misc/rosewill_rxs3211_passwords.rb
@@ -119,5 +119,4 @@ class MetasploitModule < Msf::Auxiliary
return pkt[0][333,12] if pkt[0][6,4] == "\x01\x06\xff\xf9"
end
-
end
diff --git a/modules/auxiliary/scanner/misc/sercomm_backdoor_scanner.rb b/modules/auxiliary/scanner/misc/sercomm_backdoor_scanner.rb
index 828461ef73..74b6a38c96 100644
--- a/modules/auxiliary/scanner/misc/sercomm_backdoor_scanner.rb
+++ b/modules/auxiliary/scanner/misc/sercomm_backdoor_scanner.rb
@@ -64,5 +64,4 @@ class MetasploitModule < Msf::Auxiliary
vprint_status("#{ip}:#{rport} - Connection failed: #{e.class}: #{e}")
end
end
-
end
diff --git a/modules/auxiliary/scanner/misc/zenworks_preboot_fileaccess.rb b/modules/auxiliary/scanner/misc/zenworks_preboot_fileaccess.rb
index 1c9011a543..3e7db50100 100644
--- a/modules/auxiliary/scanner/misc/zenworks_preboot_fileaccess.rb
+++ b/modules/auxiliary/scanner/misc/zenworks_preboot_fileaccess.rb
@@ -86,5 +86,4 @@ class MetasploitModule < Msf::Auxiliary
)
print_status("File saved in: #{path}")
end
-
end
diff --git a/modules/auxiliary/scanner/msf/msf_web_login.rb b/modules/auxiliary/scanner/msf/msf_web_login.rb
index c11aae36d2..73c4453e40 100644
--- a/modules/auxiliary/scanner/msf/msf_web_login.rb
+++ b/modules/auxiliary/scanner/msf/msf_web_login.rb
@@ -163,5 +163,4 @@ class MetasploitModule < Msf::Auxiliary
create_credential_login(login_data)
end
-
end
diff --git a/modules/auxiliary/scanner/mssql/mssql_login.rb b/modules/auxiliary/scanner/mssql/mssql_login.rb
index 04099d3df1..a289c65d49 100644
--- a/modules/auxiliary/scanner/mssql/mssql_login.rb
+++ b/modules/auxiliary/scanner/mssql/mssql_login.rb
@@ -86,5 +86,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb b/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb
index 96c8b95e51..496b94a293 100644
--- a/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb
+++ b/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb
@@ -209,5 +209,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("#{rhost}:#{rport} Hash Table has been saved: #{path}")
end
-
end
diff --git a/modules/auxiliary/scanner/mysql/mysql_file_enum.rb b/modules/auxiliary/scanner/mysql/mysql_file_enum.rb
index 7e37fa8c5a..477473dffe 100644
--- a/modules/auxiliary/scanner/mysql/mysql_file_enum.rb
+++ b/modules/auxiliary/scanner/mysql/mysql_file_enum.rb
@@ -123,5 +123,4 @@ class MetasploitModule < Msf::Auxiliary
return
end
-
end
diff --git a/modules/auxiliary/scanner/mysql/mysql_schemadump.rb b/modules/auxiliary/scanner/mysql/mysql_schemadump.rb
index 78ae3ceb09..4348facfff 100644
--- a/modules/auxiliary/scanner/mysql/mysql_schemadump.rb
+++ b/modules/auxiliary/scanner/mysql/mysql_schemadump.rb
@@ -124,5 +124,4 @@ class MetasploitModule < Msf::Auxiliary
end
return tables
end
-
end
diff --git a/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb b/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb
index b20da08f77..52b67cbc51 100644
--- a/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb
+++ b/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb
@@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary
)
end
end
-
end
diff --git a/modules/auxiliary/scanner/nessus/nessus_rest_login.rb b/modules/auxiliary/scanner/nessus/nessus_rest_login.rb
index 26b1d8db45..29276f1e84 100644
--- a/modules/auxiliary/scanner/nessus/nessus_rest_login.rb
+++ b/modules/auxiliary/scanner/nessus/nessus_rest_login.rb
@@ -138,5 +138,4 @@ class MetasploitModule < Msf::Auxiliary
bruteforce(ip)
end
-
end
diff --git a/modules/auxiliary/scanner/nessus/nessus_xmlrpc_login.rb b/modules/auxiliary/scanner/nessus/nessus_xmlrpc_login.rb
index 51298c68f0..a98912160d 100644
--- a/modules/auxiliary/scanner/nessus/nessus_xmlrpc_login.rb
+++ b/modules/auxiliary/scanner/nessus/nessus_xmlrpc_login.rb
@@ -128,5 +128,4 @@ class MetasploitModule < Msf::Auxiliary
create_credential_login(login_data)
end
-
end
diff --git a/modules/auxiliary/scanner/nfs/nfsmount.rb b/modules/auxiliary/scanner/nfs/nfsmount.rb
index 169ef2523d..6b0781c4d0 100644
--- a/modules/auxiliary/scanner/nfs/nfsmount.rb
+++ b/modules/auxiliary/scanner/nfs/nfsmount.rb
@@ -80,5 +80,4 @@ class MetasploitModule < Msf::Auxiliary
vprint_error(e.to_s)
end
end
-
end
diff --git a/modules/auxiliary/scanner/oracle/isqlplus_login.rb b/modules/auxiliary/scanner/oracle/isqlplus_login.rb
index 8cf49999c3..abd77a21cf 100644
--- a/modules/auxiliary/scanner/oracle/isqlplus_login.rb
+++ b/modules/auxiliary/scanner/oracle/isqlplus_login.rb
@@ -269,5 +269,4 @@ class MetasploitModule < Msf::Auxiliary
end
report_cred(ora_info)
end
-
end
diff --git a/modules/auxiliary/scanner/oracle/isqlplus_sidbrute.rb b/modules/auxiliary/scanner/oracle/isqlplus_sidbrute.rb
index 301d3541bf..b2dfb1e2c6 100644
--- a/modules/auxiliary/scanner/oracle/isqlplus_sidbrute.rb
+++ b/modules/auxiliary/scanner/oracle/isqlplus_sidbrute.rb
@@ -222,5 +222,4 @@ class MetasploitModule < Msf::Auxiliary
report_oracle_sid(ip,sid) if guess
return guess
end
-
end
diff --git a/modules/auxiliary/scanner/oracle/oracle_login.rb b/modules/auxiliary/scanner/oracle/oracle_login.rb
index 477e7fba29..68be0910b9 100644
--- a/modules/auxiliary/scanner/oracle/oracle_login.rb
+++ b/modules/auxiliary/scanner/oracle/oracle_login.rb
@@ -208,5 +208,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/pcanywhere/pcanywhere_login.rb b/modules/auxiliary/scanner/pcanywhere/pcanywhere_login.rb
index 8b9cd1aa26..d398bece18 100644
--- a/modules/auxiliary/scanner/pcanywhere/pcanywhere_login.rb
+++ b/modules/auxiliary/scanner/pcanywhere/pcanywhere_login.rb
@@ -188,5 +188,4 @@ class MetasploitModule < Msf::Auxiliary
header << data
return header
end
-
end
diff --git a/modules/auxiliary/scanner/pcanywhere/pcanywhere_udp.rb b/modules/auxiliary/scanner/pcanywhere/pcanywhere_udp.rb
index 722e6920ae..656ce151fa 100644
--- a/modules/auxiliary/scanner/pcanywhere/pcanywhere_udp.rb
+++ b/modules/auxiliary/scanner/pcanywhere/pcanywhere_udp.rb
@@ -91,5 +91,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/pop3/pop3_version.rb b/modules/auxiliary/scanner/pop3/pop3_version.rb
index fae6f81494..5240de754b 100644
--- a/modules/auxiliary/scanner/pop3/pop3_version.rb
+++ b/modules/auxiliary/scanner/pop3/pop3_version.rb
@@ -34,5 +34,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("#{ip}:#{rport} - #{e} #{e.backtrace}")
end
end
-
end
diff --git a/modules/auxiliary/scanner/portscan/ack.rb b/modules/auxiliary/scanner/portscan/ack.rb
index 78b178eefd..5c377f751c 100644
--- a/modules/auxiliary/scanner/portscan/ack.rb
+++ b/modules/auxiliary/scanner/portscan/ack.rb
@@ -148,5 +148,4 @@ class MetasploitModule < Msf::Auxiliary
end
return reply
end
-
end
diff --git a/modules/auxiliary/scanner/portscan/syn.rb b/modules/auxiliary/scanner/portscan/syn.rb
index 731afdca18..a0207947f0 100644
--- a/modules/auxiliary/scanner/portscan/syn.rb
+++ b/modules/auxiliary/scanner/portscan/syn.rb
@@ -137,5 +137,4 @@ class MetasploitModule < Msf::Auxiliary
end
return reply
end
-
end
diff --git a/modules/auxiliary/scanner/portscan/tcp.rb b/modules/auxiliary/scanner/portscan/tcp.rb
index e9299be215..2848005f94 100644
--- a/modules/auxiliary/scanner/portscan/tcp.rb
+++ b/modules/auxiliary/scanner/portscan/tcp.rb
@@ -107,5 +107,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/portscan/xmas.rb b/modules/auxiliary/scanner/portscan/xmas.rb
index 12f5378b24..6696a75afe 100644
--- a/modules/auxiliary/scanner/portscan/xmas.rb
+++ b/modules/auxiliary/scanner/portscan/xmas.rb
@@ -148,5 +148,4 @@ class MetasploitModule < Msf::Auxiliary
end
return reply
end
-
end
diff --git a/modules/auxiliary/scanner/postgres/postgres_dbname_flag_injection.rb b/modules/auxiliary/scanner/postgres/postgres_dbname_flag_injection.rb
index 6e5be089e7..6cf5269ebb 100644
--- a/modules/auxiliary/scanner/postgres/postgres_dbname_flag_injection.rb
+++ b/modules/auxiliary/scanner/postgres/postgres_dbname_flag_injection.rb
@@ -67,5 +67,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("#{rhost}:#{rport} does not appear to be vulnerable to CVE-2013-1899")
end
end
-
end
diff --git a/modules/auxiliary/scanner/postgres/postgres_version.rb b/modules/auxiliary/scanner/postgres/postgres_version.rb
index 06172cb2fc..0df0de3154 100644
--- a/modules/auxiliary/scanner/postgres/postgres_version.rb
+++ b/modules/auxiliary/scanner/postgres/postgres_version.rb
@@ -131,5 +131,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/printer/canon_iradv_pwd_extract.rb b/modules/auxiliary/scanner/printer/canon_iradv_pwd_extract.rb
index 72aaae74a8..355ff88ac5 100644
--- a/modules/auxiliary/scanner/printer/canon_iradv_pwd_extract.rb
+++ b/modules/auxiliary/scanner/printer/canon_iradv_pwd_extract.rb
@@ -208,5 +208,4 @@ class MetasploitModule < Msf::Auxiliary
users << user_attributes
end
end
-
end
diff --git a/modules/auxiliary/scanner/printer/printer_delete_file.rb b/modules/auxiliary/scanner/printer/printer_delete_file.rb
index c80b19cad6..62ce424936 100644
--- a/modules/auxiliary/scanner/printer/printer_delete_file.rb
+++ b/modules/auxiliary/scanner/printer/printer_delete_file.rb
@@ -52,5 +52,4 @@ class MetasploitModule < Msf::Auxiliary
pjl.end_job
disconnect
end
-
end
diff --git a/modules/auxiliary/scanner/printer/printer_download_file.rb b/modules/auxiliary/scanner/printer/printer_download_file.rb
index cc3895cdb6..15c5988fc6 100644
--- a/modules/auxiliary/scanner/printer/printer_download_file.rb
+++ b/modules/auxiliary/scanner/printer/printer_download_file.rb
@@ -61,5 +61,4 @@ class MetasploitModule < Msf::Auxiliary
print_good("#{ip}:#{rport} - Saved #{path} as #{res}")
end
end
-
end
diff --git a/modules/auxiliary/scanner/printer/printer_env_vars.rb b/modules/auxiliary/scanner/printer/printer_env_vars.rb
index f414f166b1..e597a2f684 100644
--- a/modules/auxiliary/scanner/printer/printer_env_vars.rb
+++ b/modules/auxiliary/scanner/printer/printer_env_vars.rb
@@ -56,5 +56,4 @@ class MetasploitModule < Msf::Auxiliary
)
end
end
-
end
diff --git a/modules/auxiliary/scanner/printer/printer_list_dir.rb b/modules/auxiliary/scanner/printer/printer_list_dir.rb
index e714d7f42a..13d4ba962f 100644
--- a/modules/auxiliary/scanner/printer/printer_list_dir.rb
+++ b/modules/auxiliary/scanner/printer/printer_list_dir.rb
@@ -60,5 +60,4 @@ class MetasploitModule < Msf::Auxiliary
)
end
end
-
end
diff --git a/modules/auxiliary/scanner/printer/printer_list_volumes.rb b/modules/auxiliary/scanner/printer/printer_list_volumes.rb
index eed372019a..f654224b58 100644
--- a/modules/auxiliary/scanner/printer/printer_list_volumes.rb
+++ b/modules/auxiliary/scanner/printer/printer_list_volumes.rb
@@ -57,5 +57,4 @@ class MetasploitModule < Msf::Auxiliary
)
end
end
-
end
diff --git a/modules/auxiliary/scanner/printer/printer_ready_message.rb b/modules/auxiliary/scanner/printer/printer_ready_message.rb
index 9710e097f2..7b6d9ebc72 100644
--- a/modules/auxiliary/scanner/printer/printer_ready_message.rb
+++ b/modules/auxiliary/scanner/printer/printer_ready_message.rb
@@ -70,5 +70,4 @@ class MetasploitModule < Msf::Auxiliary
)
end
end
-
end
diff --git a/modules/auxiliary/scanner/printer/printer_upload_file.rb b/modules/auxiliary/scanner/printer/printer_upload_file.rb
index 0531396d1e..b55fde36cf 100644
--- a/modules/auxiliary/scanner/printer/printer_upload_file.rb
+++ b/modules/auxiliary/scanner/printer/printer_upload_file.rb
@@ -55,5 +55,4 @@ class MetasploitModule < Msf::Auxiliary
pjl.end_job
disconnect
end
-
end
diff --git a/modules/auxiliary/scanner/printer/printer_version_info.rb b/modules/auxiliary/scanner/printer/printer_version_info.rb
index a2f08f5efc..7b2463c55d 100644
--- a/modules/auxiliary/scanner/printer/printer_version_info.rb
+++ b/modules/auxiliary/scanner/printer/printer_version_info.rb
@@ -56,5 +56,4 @@ class MetasploitModule < Msf::Auxiliary
)
end
end
-
end
diff --git a/modules/auxiliary/scanner/rdp/ms12_020_check.rb b/modules/auxiliary/scanner/rdp/ms12_020_check.rb
index b35ebc9f32..797f07644f 100644
--- a/modules/auxiliary/scanner/rdp/ms12_020_check.rb
+++ b/modules/auxiliary/scanner/rdp/ms12_020_check.rb
@@ -193,5 +193,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("#{ip}:#{rport} - #{status[1]}")
end
end
-
end
diff --git a/modules/auxiliary/scanner/rogue/rogue_recv.rb b/modules/auxiliary/scanner/rogue/rogue_recv.rb
index 4a174f4165..73ec4dfe23 100644
--- a/modules/auxiliary/scanner/rogue/rogue_recv.rb
+++ b/modules/auxiliary/scanner/rogue/rogue_recv.rb
@@ -72,5 +72,4 @@ class MetasploitModule < Msf::Auxiliary
end
return reply
end
-
end
diff --git a/modules/auxiliary/scanner/rservices/rexec_login.rb b/modules/auxiliary/scanner/rservices/rexec_login.rb
index e867109960..d7dfb300e6 100644
--- a/modules/auxiliary/scanner/rservices/rexec_login.rb
+++ b/modules/auxiliary/scanner/rservices/rexec_login.rb
@@ -184,5 +184,4 @@ class MetasploitModule < Msf::Auxiliary
start_session(self, "rexec #{user}:#{pass} (#{host}:#{port})", merge_me)
end
-
end
diff --git a/modules/auxiliary/scanner/rservices/rlogin_login.rb b/modules/auxiliary/scanner/rservices/rlogin_login.rb
index 3a274f3a06..662a1fd989 100644
--- a/modules/auxiliary/scanner/rservices/rlogin_login.rb
+++ b/modules/auxiliary/scanner/rservices/rlogin_login.rb
@@ -329,5 +329,4 @@ class MetasploitModule < Msf::Auxiliary
start_session(self, info, merge_me)
end
-
end
diff --git a/modules/auxiliary/scanner/rservices/rsh_login.rb b/modules/auxiliary/scanner/rservices/rsh_login.rb
index 8ff120b7a9..fd758bb1cf 100644
--- a/modules/auxiliary/scanner/rservices/rsh_login.rb
+++ b/modules/auxiliary/scanner/rservices/rsh_login.rb
@@ -269,5 +269,4 @@ class MetasploitModule < Msf::Auxiliary
start_session(self, "RSH #{user} from #{luser} (#{host}:#{port})", merge_me)
end
-
end
diff --git a/modules/auxiliary/scanner/sap/sap_router_portscanner.rb b/modules/auxiliary/scanner/sap/sap_router_portscanner.rb
index 446522d41f..fb8edd121e 100644
--- a/modules/auxiliary/scanner/sap/sap_router_portscanner.rb
+++ b/modules/auxiliary/scanner/sap/sap_router_portscanner.rb
@@ -423,5 +423,4 @@ class MetasploitModule < Msf::Auxiliary
print(tbl.to_s)
end
-
end
diff --git a/modules/auxiliary/scanner/sap/sap_smb_relay.rb b/modules/auxiliary/scanner/sap/sap_smb_relay.rb
index a1d8643b2f..03e783811b 100644
--- a/modules/auxiliary/scanner/sap/sap_smb_relay.rb
+++ b/modules/auxiliary/scanner/sap/sap_smb_relay.rb
@@ -248,5 +248,4 @@ class MetasploitModule < Msf::Auxiliary
run_clba_update_file_remote
end
end
-
end
diff --git a/modules/auxiliary/scanner/scada/digi_addp_reboot.rb b/modules/auxiliary/scanner/scada/digi_addp_reboot.rb
index 2bdb5a0322..4d5dc1cc14 100644
--- a/modules/auxiliary/scanner/scada/digi_addp_reboot.rb
+++ b/modules/auxiliary/scanner/scada/digi_addp_reboot.rb
@@ -67,5 +67,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("#{shost}:#{sport} Reboot Status: " + Rex::Proto::ADDP.reply_to_string(@results[shost]))
end
end
-
end
diff --git a/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb b/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb
index 97bf83be5e..05eb9aa8ca 100644
--- a/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb
+++ b/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb
@@ -80,5 +80,4 @@ class MetasploitModule < Msf::Auxiliary
realport_disconnect
end
-
end
diff --git a/modules/auxiliary/scanner/scada/indusoft_ntwebserver_fileaccess.rb b/modules/auxiliary/scanner/scada/indusoft_ntwebserver_fileaccess.rb
index 756a9c8a2f..6a4acf7617 100644
--- a/modules/auxiliary/scanner/scada/indusoft_ntwebserver_fileaccess.rb
+++ b/modules/auxiliary/scanner/scada/indusoft_ntwebserver_fileaccess.rb
@@ -102,6 +102,5 @@ class MetasploitModule < Msf::Auxiliary
print_error("#{rhost}:#{rport} - Failed to retrieve file")
end
-
end
diff --git a/modules/auxiliary/scanner/scada/sielco_winlog_fileaccess.rb b/modules/auxiliary/scanner/scada/sielco_winlog_fileaccess.rb
index c1dd2c52f7..dc959c5d2d 100644
--- a/modules/auxiliary/scanner/scada/sielco_winlog_fileaccess.rb
+++ b/modules/auxiliary/scanner/scada/sielco_winlog_fileaccess.rb
@@ -144,5 +144,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("#{ip}:#{rport} - File saved in: #{path}")
end
-
end
diff --git a/modules/auxiliary/scanner/smb/psexec_loggedin_users.rb b/modules/auxiliary/scanner/smb/psexec_loggedin_users.rb
index e12998b3fc..26804343f2 100644
--- a/modules/auxiliary/scanner/smb/psexec_loggedin_users.rb
+++ b/modules/auxiliary/scanner/smb/psexec_loggedin_users.rb
@@ -210,5 +210,4 @@ class MetasploitModule < Msf::Auxiliary
return nil
end
end
-
end
diff --git a/modules/auxiliary/scanner/smb/smb2.rb b/modules/auxiliary/scanner/smb/smb2.rb
index a3f0162624..f083842327 100644
--- a/modules/auxiliary/scanner/smb/smb2.rb
+++ b/modules/auxiliary/scanner/smb/smb2.rb
@@ -86,5 +86,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
end
-
end
diff --git a/modules/auxiliary/scanner/smb/smb_uninit_cred.rb b/modules/auxiliary/scanner/smb/smb_uninit_cred.rb
index 50f21a7625..35a8738a70 100644
--- a/modules/auxiliary/scanner/smb/smb_uninit_cred.rb
+++ b/modules/auxiliary/scanner/smb/smb_uninit_cred.rb
@@ -263,6 +263,5 @@ class MetasploitModule < Msf::Auxiliary
print_status("The target appears to be safe")
end
end
-
end
diff --git a/modules/auxiliary/scanner/smb/smb_version.rb b/modules/auxiliary/scanner/smb/smb_version.rb
index c619170c03..61e2e6e5b6 100644
--- a/modules/auxiliary/scanner/smb/smb_version.rb
+++ b/modules/auxiliary/scanner/smb/smb_version.rb
@@ -188,5 +188,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/smtp/smtp_enum.rb b/modules/auxiliary/scanner/smtp/smtp_enum.rb
index 31cbc342ff..b74350d52e 100644
--- a/modules/auxiliary/scanner/smtp/smtp_enum.rb
+++ b/modules/auxiliary/scanner/smtp/smtp_enum.rb
@@ -209,5 +209,4 @@ class MetasploitModule < Msf::Auxiliary
save_array = words.split(/\r?\n/)
return save_array
end
-
end
diff --git a/modules/auxiliary/scanner/smtp/smtp_ntlm_domain.rb b/modules/auxiliary/scanner/smtp/smtp_ntlm_domain.rb
index b5be1ccc35..f2ecf0b685 100644
--- a/modules/auxiliary/scanner/smtp/smtp_ntlm_domain.rb
+++ b/modules/auxiliary/scanner/smtp/smtp_ntlm_domain.rb
@@ -119,5 +119,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect
end
end
-
end
diff --git a/modules/auxiliary/scanner/smtp/smtp_version.rb b/modules/auxiliary/scanner/smtp/smtp_version.rb
index dd16bfe000..47d4ead614 100644
--- a/modules/auxiliary/scanner/smtp/smtp_version.rb
+++ b/modules/auxiliary/scanner/smtp/smtp_version.rb
@@ -28,5 +28,4 @@ class MetasploitModule < Msf::Auxiliary
print_good("#{ip}:#{rport} SMTP #{banner_sanitized}")
report_service(:host => rhost, :port => rport, :name => "smtp", :info => banner)
end
-
end
diff --git a/modules/auxiliary/scanner/snmp/aix_version.rb b/modules/auxiliary/scanner/snmp/aix_version.rb
index e41238cfe8..4fd1f4261a 100644
--- a/modules/auxiliary/scanner/snmp/aix_version.rb
+++ b/modules/auxiliary/scanner/snmp/aix_version.rb
@@ -70,5 +70,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/snmp/cisco_config_tftp.rb b/modules/auxiliary/scanner/snmp/cisco_config_tftp.rb
index 79c82166e4..d3894faca0 100644
--- a/modules/auxiliary/scanner/snmp/cisco_config_tftp.rb
+++ b/modules/auxiliary/scanner/snmp/cisco_config_tftp.rb
@@ -152,5 +152,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect_snmp
end
end
-
end
diff --git a/modules/auxiliary/scanner/snmp/cisco_upload_file.rb b/modules/auxiliary/scanner/snmp/cisco_upload_file.rb
index fce118398d..89f29f17be 100644
--- a/modules/auxiliary/scanner/snmp/cisco_upload_file.rb
+++ b/modules/auxiliary/scanner/snmp/cisco_upload_file.rb
@@ -128,5 +128,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect_snmp
end
end
-
end
diff --git a/modules/auxiliary/scanner/snmp/sbg6580_enum.rb b/modules/auxiliary/scanner/snmp/sbg6580_enum.rb
index d5c2912d39..776248448c 100644
--- a/modules/auxiliary/scanner/snmp/sbg6580_enum.rb
+++ b/modules/auxiliary/scanner/snmp/sbg6580_enum.rb
@@ -308,5 +308,4 @@ class MetasploitModule < Msf::Auxiliary
output_data["RADIUS Key"] = radius_key.to_s
end
end
-
end
diff --git a/modules/auxiliary/scanner/snmp/snmp_enumshares.rb b/modules/auxiliary/scanner/snmp/snmp_enumshares.rb
index d30e83b4f7..241c792195 100644
--- a/modules/auxiliary/scanner/snmp/snmp_enumshares.rb
+++ b/modules/auxiliary/scanner/snmp/snmp_enumshares.rb
@@ -59,5 +59,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/snmp/snmp_set.rb b/modules/auxiliary/scanner/snmp/snmp_set.rb
index cb647f14cd..ddb5e9959e 100644
--- a/modules/auxiliary/scanner/snmp/snmp_set.rb
+++ b/modules/auxiliary/scanner/snmp/snmp_set.rb
@@ -88,5 +88,4 @@ class MetasploitModule < Msf::Auxiliary
disconnect_snmp
end
end
-
end
diff --git a/modules/auxiliary/scanner/ssh/detect_kippo.rb b/modules/auxiliary/scanner/ssh/detect_kippo.rb
index 3bfb47467e..8241aed2c3 100644
--- a/modules/auxiliary/scanner/ssh/detect_kippo.rb
+++ b/modules/auxiliary/scanner/ssh/detect_kippo.rb
@@ -47,5 +47,4 @@ class MetasploitModule < Msf::Auxiliary
vprint_status("#{ip}:#{rport} - #{banner.strip} detected")
end
end
-
end
diff --git a/modules/auxiliary/scanner/ssh/fortinet_backdoor.rb b/modules/auxiliary/scanner/ssh/fortinet_backdoor.rb
index fc90951c6c..a692f3cd47 100644
--- a/modules/auxiliary/scanner/ssh/fortinet_backdoor.rb
+++ b/modules/auxiliary/scanner/ssh/fortinet_backdoor.rb
@@ -77,5 +77,4 @@ class MetasploitModule < Msf::Auxiliary
def rport
datastore['RPORT']
end
-
end
diff --git a/modules/auxiliary/scanner/ssh/juniper_backdoor.rb b/modules/auxiliary/scanner/ssh/juniper_backdoor.rb
index e6f7a7dfc4..d516dfb9fe 100644
--- a/modules/auxiliary/scanner/ssh/juniper_backdoor.rb
+++ b/modules/auxiliary/scanner/ssh/juniper_backdoor.rb
@@ -79,5 +79,4 @@ class MetasploitModule < Msf::Auxiliary
def rport
datastore['RPORT']
end
-
end
diff --git a/modules/auxiliary/scanner/ssh/ssh_enumusers.rb b/modules/auxiliary/scanner/ssh/ssh_enumusers.rb
index 5bce65cfa7..c0e14f5dcf 100644
--- a/modules/auxiliary/scanner/ssh/ssh_enumusers.rb
+++ b/modules/auxiliary/scanner/ssh/ssh_enumusers.rb
@@ -191,5 +191,4 @@ class MetasploitModule < Msf::Auxiliary
user_list.each{ |user| show_result(attempt_user(user, ip), user, ip) }
end
end
-
end
diff --git a/modules/auxiliary/scanner/ssh/ssh_identify_pubkeys.rb b/modules/auxiliary/scanner/ssh/ssh_identify_pubkeys.rb
index d93c76f913..c710b45463 100644
--- a/modules/auxiliary/scanner/ssh/ssh_identify_pubkeys.rb
+++ b/modules/auxiliary/scanner/ssh/ssh_identify_pubkeys.rb
@@ -384,5 +384,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/ssh/ssh_login.rb b/modules/auxiliary/scanner/ssh/ssh_login.rb
index 6cd494a96f..2836f3bf85 100644
--- a/modules/auxiliary/scanner/ssh/ssh_login.rb
+++ b/modules/auxiliary/scanner/ssh/ssh_login.rb
@@ -156,5 +156,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/scanner/ssl/openssl_ccs.rb b/modules/auxiliary/scanner/ssl/openssl_ccs.rb
index 5e9379c6f0..6efbf34aaf 100644
--- a/modules/auxiliary/scanner/ssl/openssl_ccs.rb
+++ b/modules/auxiliary/scanner/ssl/openssl_ccs.rb
@@ -195,6 +195,5 @@ class MetasploitModule < Msf::Auxiliary
true
end
-
end
diff --git a/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb b/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb
index bc012b8b19..74f2378a32 100644
--- a/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb
+++ b/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb
@@ -835,5 +835,4 @@ class MetasploitModule < Msf::Auxiliary
# TODO: return hash with data
true
end
-
end
diff --git a/modules/auxiliary/scanner/telephony/wardial.rb b/modules/auxiliary/scanner/telephony/wardial.rb
index ca8845073d..7c74a51ebd 100644
--- a/modules/auxiliary/scanner/telephony/wardial.rb
+++ b/modules/auxiliary/scanner/telephony/wardial.rb
@@ -442,5 +442,4 @@ class MetasploitModule < Msf::Auxiliary
print("\n") if @displaymodem
return banner
end
-
end
diff --git a/modules/auxiliary/scanner/telnet/lantronix_telnet_password.rb b/modules/auxiliary/scanner/telnet/lantronix_telnet_password.rb
index d863e521d1..c2a5bcaa0a 100644
--- a/modules/auxiliary/scanner/telnet/lantronix_telnet_password.rb
+++ b/modules/auxiliary/scanner/telnet/lantronix_telnet_password.rb
@@ -110,5 +110,4 @@ class MetasploitModule < Msf::Auxiliary
return nil
end
end
-
end
diff --git a/modules/auxiliary/scanner/telnet/telnet_login.rb b/modules/auxiliary/scanner/telnet/telnet_login.rb
index c12fb8408e..17fbb8517c 100644
--- a/modules/auxiliary/scanner/telnet/telnet_login.rb
+++ b/modules/auxiliary/scanner/telnet/telnet_login.rb
@@ -110,5 +110,4 @@ class MetasploitModule < Msf::Auxiliary
start_session(self, "TELNET #{user}:#{pass} (#{host}:#{port})", merge_me, true, scanner.sock)
end
-
end
diff --git a/modules/auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp.rb b/modules/auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp.rb
index d9a94b2e40..e3ae15b5f7 100644
--- a/modules/auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp.rb
+++ b/modules/auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp.rb
@@ -108,7 +108,6 @@ class MetasploitModule < Msf::Auxiliary
pkt << [block].pack("n") # Block Id
end
-
end
=begin
diff --git a/modules/auxiliary/scanner/tftp/netdecision_tftp.rb b/modules/auxiliary/scanner/tftp/netdecision_tftp.rb
index 15ff30174c..8082b8ef84 100644
--- a/modules/auxiliary/scanner/tftp/netdecision_tftp.rb
+++ b/modules/auxiliary/scanner/tftp/netdecision_tftp.rb
@@ -109,5 +109,4 @@ class MetasploitModule < Msf::Auxiliary
pkt << [block].pack("n") # Block Id
end
-
end
diff --git a/modules/auxiliary/scanner/tftp/tftpbrute.rb b/modules/auxiliary/scanner/tftp/tftpbrute.rb
index 8d772c4327..97fd6db306 100644
--- a/modules/auxiliary/scanner/tftp/tftpbrute.rb
+++ b/modules/auxiliary/scanner/tftp/tftpbrute.rb
@@ -66,5 +66,4 @@ class MetasploitModule < Msf::Auxiliary
udp_sock.close
end
end
-
end
diff --git a/modules/auxiliary/scanner/vmware/esx_fingerprint.rb b/modules/auxiliary/scanner/vmware/esx_fingerprint.rb
index bc9c9a33fa..b1bf03d5c6 100644
--- a/modules/auxiliary/scanner/vmware/esx_fingerprint.rb
+++ b/modules/auxiliary/scanner/vmware/esx_fingerprint.rb
@@ -91,5 +91,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/vmware/vmware_enum_permissions.rb b/modules/auxiliary/scanner/vmware/vmware_enum_permissions.rb
index 8d06911529..5026f6b9ac 100644
--- a/modules/auxiliary/scanner/vmware/vmware_enum_permissions.rb
+++ b/modules/auxiliary/scanner/vmware/vmware_enum_permissions.rb
@@ -84,5 +84,4 @@ class MetasploitModule < Msf::Auxiliary
return
end
end
-
end
diff --git a/modules/auxiliary/scanner/vmware/vmware_enum_sessions.rb b/modules/auxiliary/scanner/vmware/vmware_enum_sessions.rb
index 8bbec1cf55..ffdfc60998 100644
--- a/modules/auxiliary/scanner/vmware/vmware_enum_sessions.rb
+++ b/modules/auxiliary/scanner/vmware/vmware_enum_sessions.rb
@@ -70,5 +70,4 @@ class MetasploitModule < Msf::Auxiliary
return
end
end
-
end
diff --git a/modules/auxiliary/scanner/vmware/vmware_enum_users.rb b/modules/auxiliary/scanner/vmware/vmware_enum_users.rb
index c26b4e6a8d..ec7ad9b242 100644
--- a/modules/auxiliary/scanner/vmware/vmware_enum_users.rb
+++ b/modules/auxiliary/scanner/vmware/vmware_enum_users.rb
@@ -127,5 +127,4 @@ class MetasploitModule < Msf::Auxiliary
return
end
end
-
end
diff --git a/modules/auxiliary/scanner/vmware/vmware_enum_vms.rb b/modules/auxiliary/scanner/vmware/vmware_enum_vms.rb
index 0f5e45acb3..4341192d42 100644
--- a/modules/auxiliary/scanner/vmware/vmware_enum_vms.rb
+++ b/modules/auxiliary/scanner/vmware/vmware_enum_vms.rb
@@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary
return
end
end
-
end
diff --git a/modules/auxiliary/scanner/vmware/vmware_host_details.rb b/modules/auxiliary/scanner/vmware/vmware_host_details.rb
index 9938eaf0b2..247a82c677 100644
--- a/modules/auxiliary/scanner/vmware/vmware_host_details.rb
+++ b/modules/auxiliary/scanner/vmware/vmware_host_details.rb
@@ -45,5 +45,4 @@ class MetasploitModule < Msf::Auxiliary
return
end
end
-
end
diff --git a/modules/auxiliary/scanner/vmware/vmware_screenshot_stealer.rb b/modules/auxiliary/scanner/vmware/vmware_screenshot_stealer.rb
index a3c8015b8c..72fbfd0549 100644
--- a/modules/auxiliary/scanner/vmware/vmware_screenshot_stealer.rb
+++ b/modules/auxiliary/scanner/vmware/vmware_screenshot_stealer.rb
@@ -96,5 +96,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/vmware/vmware_server_dir_trav.rb b/modules/auxiliary/scanner/vmware/vmware_server_dir_trav.rb
index 22fd3ba737..53ec36eb8b 100644
--- a/modules/auxiliary/scanner/vmware/vmware_server_dir_trav.rb
+++ b/modules/auxiliary/scanner/vmware/vmware_server_dir_trav.rb
@@ -78,5 +78,4 @@ class MetasploitModule < Msf::Auxiliary
rescue ::Timeout::Error, ::Errno::EPIPE
end
end
-
end
diff --git a/modules/auxiliary/scanner/vnc/vnc_login.rb b/modules/auxiliary/scanner/vnc/vnc_login.rb
index 1ebde58490..f96f34e06f 100644
--- a/modules/auxiliary/scanner/vnc/vnc_login.rb
+++ b/modules/auxiliary/scanner/vnc/vnc_login.rb
@@ -108,5 +108,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/scanner/voice/recorder.rb b/modules/auxiliary/scanner/voice/recorder.rb
index 951b25abed..718eb1db5a 100644
--- a/modules/auxiliary/scanner/voice/recorder.rb
+++ b/modules/auxiliary/scanner/voice/recorder.rb
@@ -68,5 +68,4 @@ class MetasploitModule < Msf::Auxiliary
# Next call
end
end
-
end
diff --git a/modules/auxiliary/scanner/winrm/winrm_login.rb b/modules/auxiliary/scanner/winrm/winrm_login.rb
index 3a43e3a4b0..1f2d39df59 100644
--- a/modules/auxiliary/scanner/winrm/winrm_login.rb
+++ b/modules/auxiliary/scanner/winrm/winrm_login.rb
@@ -85,7 +85,6 @@ class MetasploitModule < Msf::Auxiliary
def test_request
return winrm_wql_msg("Select Name,Status from Win32_Service")
end
-
end
=begin
diff --git a/modules/auxiliary/scanner/winrm/winrm_wql.rb b/modules/auxiliary/scanner/winrm/winrm_wql.rb
index d3eb4dad38..3bacbde2a6 100644
--- a/modules/auxiliary/scanner/winrm/winrm_wql.rb
+++ b/modules/auxiliary/scanner/winrm/winrm_wql.rb
@@ -55,7 +55,6 @@ class MetasploitModule < Msf::Auxiliary
path = store_loot("winrm.wql_results", "text/csv", ip, resp_tbl.to_csv, "winrm_wql_results.csv", "WinRM WQL Query Results")
print_status "Results saved to #{path}"
end
-
end
=begin
diff --git a/modules/auxiliary/scanner/x11/open_x11.rb b/modules/auxiliary/scanner/x11/open_x11.rb
index 09af6dcf8c..c2de0078bd 100644
--- a/modules/auxiliary/scanner/x11/open_x11.rb
+++ b/modules/auxiliary/scanner/x11/open_x11.rb
@@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/server/android_browsable_msf_launch.rb b/modules/auxiliary/server/android_browsable_msf_launch.rb
index 0c7160d99c..15825c2084 100644
--- a/modules/auxiliary/server/android_browsable_msf_launch.rb
+++ b/modules/auxiliary/server/android_browsable_msf_launch.rb
@@ -49,5 +49,4 @@ location.href = "intent://my_host#Intent;scheme=metasploit;action=android.intent
print_status("Sending HTML...")
send_response(cli, html)
end
-
end
diff --git a/modules/auxiliary/server/android_mercury_parseuri.rb b/modules/auxiliary/server/android_mercury_parseuri.rb
index 948059ba0a..8b735a77ab 100644
--- a/modules/auxiliary/server/android_mercury_parseuri.rb
+++ b/modules/auxiliary/server/android_mercury_parseuri.rb
@@ -150,5 +150,4 @@ class MetasploitModule < Msf::Auxiliary
def run
exploit
end
-
end
diff --git a/modules/auxiliary/server/browser_autopwn.rb b/modules/auxiliary/server/browser_autopwn.rb
index 71c1eff104..f42f3836c6 100644
--- a/modules/auxiliary/server/browser_autopwn.rb
+++ b/modules/auxiliary/server/browser_autopwn.rb
@@ -1072,5 +1072,4 @@ class MetasploitModule < Msf::Auxiliary
end
super
end
-
end
diff --git a/modules/auxiliary/server/browser_autopwn2.rb b/modules/auxiliary/server/browser_autopwn2.rb
index a91787e447..35283e7d01 100644
--- a/modules/auxiliary/server/browser_autopwn2.rb
+++ b/modules/auxiliary/server/browser_autopwn2.rb
@@ -98,5 +98,4 @@ class MetasploitModule < Msf::Auxiliary
def run
exploit
end
-
end
diff --git a/modules/auxiliary/server/capture/http.rb b/modules/auxiliary/server/capture/http.rb
index 92d0397485..43e9e9bcdf 100644
--- a/modules/auxiliary/server/capture/http.rb
+++ b/modules/auxiliary/server/capture/http.rb
@@ -488,5 +488,4 @@ class MetasploitModule < Msf::Auxiliary
|
end
-
end
diff --git a/modules/auxiliary/server/capture/http_basic.rb b/modules/auxiliary/server/capture/http_basic.rb
index 293edce594..69b4fb5eac 100644
--- a/modules/auxiliary/server/capture/http_basic.rb
+++ b/modules/auxiliary/server/capture/http_basic.rb
@@ -109,5 +109,4 @@ class MetasploitModule < Msf::Auxiliary
cli.send_response(response)
end
end
-
end
diff --git a/modules/auxiliary/server/capture/http_javascript_keylogger.rb b/modules/auxiliary/server/capture/http_javascript_keylogger.rb
index 672ec74947..bf3a6e7d35 100644
--- a/modules/auxiliary/server/capture/http_javascript_keylogger.rb
+++ b/modules/auxiliary/server/capture/http_javascript_keylogger.rb
@@ -299,5 +299,4 @@ EOS
EOS
return code
end
-
end
diff --git a/modules/auxiliary/server/capture/printjob_capture.rb b/modules/auxiliary/server/capture/printjob_capture.rb
index 8552baf8df..74fef89733 100644
--- a/modules/auxiliary/server/capture/printjob_capture.rb
+++ b/modules/auxiliary/server/capture/printjob_capture.rb
@@ -270,5 +270,4 @@ class MetasploitModule < Msf::Auxiliary
print_good("Loot filename: %s" % loot)
end
end
-
end
diff --git a/modules/auxiliary/server/capture/smb.rb b/modules/auxiliary/server/capture/smb.rb
index 7e64787e5d..d046a6092e 100644
--- a/modules/auxiliary/server/capture/smb.rb
+++ b/modules/auxiliary/server/capture/smb.rb
@@ -647,5 +647,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/server/dhclient_bash_env.rb b/modules/auxiliary/server/dhclient_bash_env.rb
index ca21db3c7c..626caf1338 100644
--- a/modules/auxiliary/server/dhclient_bash_env.rb
+++ b/modules/auxiliary/server/dhclient_bash_env.rb
@@ -81,5 +81,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/server/dhcp.rb b/modules/auxiliary/server/dhcp.rb
index ca1d5ba903..3f032cc391 100644
--- a/modules/auxiliary/server/dhcp.rb
+++ b/modules/auxiliary/server/dhcp.rb
@@ -45,5 +45,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("Stopping DHCP server...")
@dhcp.stop
end
-
end
diff --git a/modules/auxiliary/server/dns/spoofhelper.rb b/modules/auxiliary/server/dns/spoofhelper.rb
index 3ca30cc38d..5366975377 100644
--- a/modules/auxiliary/server/dns/spoofhelper.rb
+++ b/modules/auxiliary/server/dns/spoofhelper.rb
@@ -98,5 +98,4 @@ class MetasploitModule < Msf::Auxiliary
@sock.close
end
end
-
end
diff --git a/modules/auxiliary/server/fakedns.rb b/modules/auxiliary/server/fakedns.rb
index f4bc5d80d8..876813b277 100644
--- a/modules/auxiliary/server/fakedns.rb
+++ b/modules/auxiliary/server/fakedns.rb
@@ -276,5 +276,4 @@ class MetasploitModule < Msf::Auxiliary
def print_status(msg)
@requestor ? super("%s:%p - DNS - %s" % [@requestor[3], @requestor[1], msg]) : super(msg)
end
-
end
diff --git a/modules/auxiliary/server/jsse_skiptls_mitm_proxy.rb b/modules/auxiliary/server/jsse_skiptls_mitm_proxy.rb
index 9a60914aad..76bdafc4e9 100644
--- a/modules/auxiliary/server/jsse_skiptls_mitm_proxy.rb
+++ b/modules/auxiliary/server/jsse_skiptls_mitm_proxy.rb
@@ -267,5 +267,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/server/local_hwbridge.rb b/modules/auxiliary/server/local_hwbridge.rb
index b8451e6ae0..773ff8d121 100644
--- a/modules/auxiliary/server/local_hwbridge.rb
+++ b/modules/auxiliary/server/local_hwbridge.rb
@@ -270,5 +270,4 @@ class MetasploitModule < Msf::Auxiliary
@server_started = Time.now
exploit
end
-
end
diff --git a/modules/auxiliary/server/ms15_134_mcl_leak.rb b/modules/auxiliary/server/ms15_134_mcl_leak.rb
index 45b512dcc4..a6205de335 100644
--- a/modules/auxiliary/server/ms15_134_mcl_leak.rb
+++ b/modules/auxiliary/server/ms15_134_mcl_leak.rb
@@ -168,5 +168,4 @@ for (var i=0; i < files.length; i++) {
vprint_status("File collected: #{file[:fname]}\n\n#{Rex::Text.to_hex_dump(file[:data])}")
end
-
end
diff --git a/modules/auxiliary/server/netbios_spoof_nat.rb b/modules/auxiliary/server/netbios_spoof_nat.rb
index 2430ebd72e..e0537e01e8 100644
--- a/modules/auxiliary/server/netbios_spoof_nat.rb
+++ b/modules/auxiliary/server/netbios_spoof_nat.rb
@@ -152,5 +152,4 @@ class MetasploitModule < Msf::Auxiliary
def run
loop { netbios_service }
end
-
end
diff --git a/modules/auxiliary/server/openssl_altchainsforgery_mitm_proxy.rb b/modules/auxiliary/server/openssl_altchainsforgery_mitm_proxy.rb
index 8a6a48ab83..4fa0faf3d2 100644
--- a/modules/auxiliary/server/openssl_altchainsforgery_mitm_proxy.rb
+++ b/modules/auxiliary/server/openssl_altchainsforgery_mitm_proxy.rb
@@ -222,5 +222,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/server/pxeexploit.rb b/modules/auxiliary/server/pxeexploit.rb
index 7d59d57a3c..8c31e68436 100644
--- a/modules/auxiliary/server/pxeexploit.rb
+++ b/modules/auxiliary/server/pxeexploit.rb
@@ -79,5 +79,4 @@ class MetasploitModule < Msf::Auxiliary
@dhcp.thread.join
end
-
end
diff --git a/modules/auxiliary/server/socks4a.rb b/modules/auxiliary/server/socks4a.rb
index fa895f9db3..c1849fa180 100644
--- a/modules/auxiliary/server/socks4a.rb
+++ b/modules/auxiliary/server/socks4a.rb
@@ -65,5 +65,4 @@ class MetasploitModule < Msf::Auxiliary
@socks4a.join
end
-
end
diff --git a/modules/auxiliary/server/tftp.rb b/modules/auxiliary/server/tftp.rb
index 69fd03b2b2..0e2ad32d89 100644
--- a/modules/auxiliary/server/tftp.rb
+++ b/modules/auxiliary/server/tftp.rb
@@ -75,5 +75,4 @@ class MetasploitModule < Msf::Auxiliary
vprint_status("Stopping TFTP server")
@tftp.stop
end
-
end
diff --git a/modules/auxiliary/server/tnftp_savefile.rb b/modules/auxiliary/server/tnftp_savefile.rb
index fd9978d05f..bc2065f74f 100644
--- a/modules/auxiliary/server/tnftp_savefile.rb
+++ b/modules/auxiliary/server/tnftp_savefile.rb
@@ -81,5 +81,4 @@ class MetasploitModule < Msf::Auxiliary
def sploit
"|#{datastore['CMD']}"
end
-
end
diff --git a/modules/auxiliary/server/webkit_xslt_dropper.rb b/modules/auxiliary/server/webkit_xslt_dropper.rb
index c2db2db257..c11e408608 100644
--- a/modules/auxiliary/server/webkit_xslt_dropper.rb
+++ b/modules/auxiliary/server/webkit_xslt_dropper.rb
@@ -83,5 +83,4 @@ EOS
def run
exploit()
end
-
end
diff --git a/modules/auxiliary/server/wpad.rb b/modules/auxiliary/server/wpad.rb
index 92d95ea117..ccaf9629dc 100644
--- a/modules/auxiliary/server/wpad.rb
+++ b/modules/auxiliary/server/wpad.rb
@@ -83,6 +83,5 @@ EOS
end
end
end
-
end
diff --git a/modules/auxiliary/sniffer/psnuffle.rb b/modules/auxiliary/sniffer/psnuffle.rb
index fb0b355197..e6202f1539 100644
--- a/modules/auxiliary/sniffer/psnuffle.rb
+++ b/modules/auxiliary/sniffer/psnuffle.rb
@@ -193,5 +193,4 @@ class BaseProtocolParser
return "%s:%d-%s:%d" % [pkt.ip_saddr,pkt.udp_sport,pkt.ip_daddr,pkt.udp_dport] if pkt.is_udp?
return "%s:%d-%s:%d" % [pkt.ip_saddr,0,pkt.ip_daddr,0]
end
-
end
diff --git a/modules/auxiliary/spoof/arp/arp_poisoning.rb b/modules/auxiliary/spoof/arp/arp_poisoning.rb
index 8c0d98e63c..ae6d9ce473 100644
--- a/modules/auxiliary/spoof/arp/arp_poisoning.rb
+++ b/modules/auxiliary/spoof/arp/arp_poisoning.rb
@@ -410,5 +410,4 @@ class MetasploitModule < Msf::Auxiliary
end
@listener.abort_on_exception = true
end
-
end
diff --git a/modules/auxiliary/spoof/cisco/dtp.rb b/modules/auxiliary/spoof/cisco/dtp.rb
index 8f3bd59996..b9a4b37c5f 100644
--- a/modules/auxiliary/spoof/cisco/dtp.rb
+++ b/modules/auxiliary/spoof/cisco/dtp.rb
@@ -80,5 +80,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/spoof/dns/bailiwicked_domain.rb b/modules/auxiliary/spoof/dns/bailiwicked_domain.rb
index c9d2d54b47..69a3128b69 100644
--- a/modules/auxiliary/spoof/dns/bailiwicked_domain.rb
+++ b/modules/auxiliary/spoof/dns/bailiwicked_domain.rb
@@ -476,5 +476,4 @@ class MetasploitModule < Msf::Auxiliary
# XXX: We should subtract the timing from the target to us (calculated based on 0.50 of our non-recursive query times)
avg_count
end
-
end
diff --git a/modules/auxiliary/spoof/dns/bailiwicked_host.rb b/modules/auxiliary/spoof/dns/bailiwicked_host.rb
index dcf5662b24..782c541444 100644
--- a/modules/auxiliary/spoof/dns/bailiwicked_host.rb
+++ b/modules/auxiliary/spoof/dns/bailiwicked_host.rb
@@ -473,5 +473,4 @@ class MetasploitModule < Msf::Auxiliary
# XXX: We should subtract the timing from the target to us (calculated based on 0.50 of our non-recursive query times)
avg_count
end
-
end
diff --git a/modules/auxiliary/spoof/dns/compare_results.rb b/modules/auxiliary/spoof/dns/compare_results.rb
index 8a9316fd2b..921b9abde3 100644
--- a/modules/auxiliary/spoof/dns/compare_results.rb
+++ b/modules/auxiliary/spoof/dns/compare_results.rb
@@ -172,5 +172,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/spoof/nbns/nbns_response.rb b/modules/auxiliary/spoof/nbns/nbns_response.rb
index f781d527a3..cac8b1f4a0 100644
--- a/modules/auxiliary/spoof/nbns/nbns_response.rb
+++ b/modules/auxiliary/spoof/nbns/nbns_response.rb
@@ -175,5 +175,4 @@ class MetasploitModule < Msf::Auxiliary
end
close_pcap
end
-
end
diff --git a/modules/auxiliary/spoof/replay/pcap_replay.rb b/modules/auxiliary/spoof/replay/pcap_replay.rb
index 68b987ba39..71b6506ed2 100644
--- a/modules/auxiliary/spoof/replay/pcap_replay.rb
+++ b/modules/auxiliary/spoof/replay/pcap_replay.rb
@@ -51,5 +51,4 @@ class MetasploitModule < Msf::Auxiliary
end
close_pcap
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb
index cd2caa9885..c6f0e58922 100644
--- a/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb
+++ b/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb
@@ -67,5 +67,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("Done! Removing function '#{name}'...")
prepare_exec(clean)
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb
index 3ba1344fae..68b2d99e3e 100644
--- a/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb
+++ b/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb
@@ -68,5 +68,4 @@ class MetasploitModule < Msf::Auxiliary
print_status("Done! Removing function '#{name}'...")
prepare_exec(clean)
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb
index 8a07c4ea09..fb164ef63f 100644
--- a/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb
+++ b/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb
@@ -76,5 +76,4 @@ END;
print_status("Done...")
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb
index 250f608e8a..065126a1e3 100644
--- a/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb
+++ b/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb
@@ -87,5 +87,4 @@ END;
print_status("Done...")
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/dbms_export_extension.rb b/modules/auxiliary/sqli/oracle/dbms_export_extension.rb
index af7b464110..1cee48248a 100644
--- a/modules/auxiliary/sqli/oracle/dbms_export_extension.rb
+++ b/modules/auxiliary/sqli/oracle/dbms_export_extension.rb
@@ -110,5 +110,4 @@ end;
# Probably should do a 'drop package #{name}'
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb b/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb
index ea7a0943a5..bd29581764 100644
--- a/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb
+++ b/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb
@@ -60,5 +60,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/droptable_trigger.rb b/modules/auxiliary/sqli/oracle/droptable_trigger.rb
index 6bddcdb6fb..4c543f073c 100644
--- a/modules/auxiliary/sqli/oracle/droptable_trigger.rb
+++ b/modules/auxiliary/sqli/oracle/droptable_trigger.rb
@@ -109,5 +109,4 @@ class MetasploitModule < Msf::Auxiliary
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb b/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb
index 9e88bdbc60..41c92b0402 100644
--- a/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb
+++ b/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb
@@ -61,5 +61,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("Error: #{e.class} #{e}")
end
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb b/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb
index 1ef2482fd1..649eabdbc5 100644
--- a/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb
+++ b/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb
@@ -50,5 +50,4 @@ class MetasploitModule < Msf::Auxiliary
print_error("Error: #{e.class} #{e}")
end
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb b/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb
index 8d25535af1..c3b00b6c9b 100644
--- a/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb
+++ b/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb
@@ -71,5 +71,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb b/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb
index 249f547db4..26d301bd13 100644
--- a/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb
+++ b/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb
@@ -55,5 +55,4 @@ EOF
return
end
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb b/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb
index 72fde554a1..9da0fc6147 100644
--- a/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb
+++ b/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb
@@ -97,5 +97,4 @@ class MetasploitModule < Msf::Auxiliary
prepare_exec(clean)
end
-
end
diff --git a/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb b/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb
index a514e1a670..01c36f4dcf 100644
--- a/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb
+++ b/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb
@@ -94,5 +94,4 @@ class MetasploitModule < Msf::Auxiliary
prepare_exec(clean)
end
-
end
diff --git a/modules/auxiliary/voip/cisco_cucdm_call_forward.rb b/modules/auxiliary/voip/cisco_cucdm_call_forward.rb
index bbc1b5cf59..cf30230ac0 100644
--- a/modules/auxiliary/voip/cisco_cucdm_call_forward.rb
+++ b/modules/auxiliary/voip/cisco_cucdm_call_forward.rb
@@ -142,5 +142,4 @@ class MetasploitModule < Msf::Auxiliary
end
end
end
-
end
diff --git a/modules/auxiliary/voip/sip_deregister.rb b/modules/auxiliary/voip/sip_deregister.rb
index 5776afe858..1ec7734ef6 100644
--- a/modules/auxiliary/voip/sip_deregister.rb
+++ b/modules/auxiliary/voip/sip_deregister.rb
@@ -122,5 +122,4 @@ class MetasploitModule < Msf::Auxiliary
return true # set response to true
end
-
end
diff --git a/modules/encoders/cmd/echo.rb b/modules/encoders/cmd/echo.rb
index 6b6d992214..f6703062c3 100644
--- a/modules/encoders/cmd/echo.rb
+++ b/modules/encoders/cmd/echo.rb
@@ -81,5 +81,4 @@ class MetasploitModule < Msf::Encoder
return buf
end
-
end
diff --git a/modules/encoders/cmd/generic_sh.rb b/modules/encoders/cmd/generic_sh.rb
index d7e5e337e8..ede81e43bb 100644
--- a/modules/encoders/cmd/generic_sh.rb
+++ b/modules/encoders/cmd/generic_sh.rb
@@ -138,5 +138,4 @@ class MetasploitModule < Msf::Encoder
return buf
end
-
end
diff --git a/modules/encoders/cmd/ifs.rb b/modules/encoders/cmd/ifs.rb
index 3bc18f74a7..2614f357b0 100644
--- a/modules/encoders/cmd/ifs.rb
+++ b/modules/encoders/cmd/ifs.rb
@@ -40,5 +40,4 @@ class MetasploitModule < Msf::Encoder
buf.gsub!(/\s/, '${IFS}')
return buf
end
-
end
diff --git a/modules/encoders/cmd/perl.rb b/modules/encoders/cmd/perl.rb
index c2eb25710e..c9d4529a65 100644
--- a/modules/encoders/cmd/perl.rb
+++ b/modules/encoders/cmd/perl.rb
@@ -121,5 +121,4 @@ class MetasploitModule < Msf::Encoder
# ends up unquoted so the shell doesn't try to expand a path.
"qq#{sep}H#{hex.length}#{sep},qq#{sep}#{hex}#{sep}"
end
-
end
diff --git a/modules/encoders/cmd/powershell_base64.rb b/modules/encoders/cmd/powershell_base64.rb
index 7ef1ad0dda..4939459add 100644
--- a/modules/encoders/cmd/powershell_base64.rb
+++ b/modules/encoders/cmd/powershell_base64.rb
@@ -48,5 +48,4 @@ class MetasploitModule < Msf::Encoder
base64 = Rex::Text.encode_base64(Rex::Text.to_unicode("cmd.exe /c start #{buf}"))
cmd = "powershell -w hidden -nop -e #{base64}"
end
-
end
diff --git a/modules/encoders/cmd/printf_php_mq.rb b/modules/encoders/cmd/printf_php_mq.rb
index 58330a2cf5..eff5471c85 100644
--- a/modules/encoders/cmd/printf_php_mq.rb
+++ b/modules/encoders/cmd/printf_php_mq.rb
@@ -73,5 +73,4 @@ class MetasploitModule < Msf::Encoder
return ret
end
-
end
diff --git a/modules/encoders/generic/eicar.rb b/modules/encoders/generic/eicar.rb
index 39c8434cac..72192700df 100644
--- a/modules/encoders/generic/eicar.rb
+++ b/modules/encoders/generic/eicar.rb
@@ -43,5 +43,4 @@ class MetasploitModule < Msf::Encoder
def encode_block(state, buf)
buf = eicar_test_string
end
-
end
diff --git a/modules/encoders/generic/none.rb b/modules/encoders/generic/none.rb
index bb31669b61..b36591ebe1 100644
--- a/modules/encoders/generic/none.rb
+++ b/modules/encoders/generic/none.rb
@@ -23,5 +23,4 @@ class MetasploitModule < Msf::Encoder
def encode_block(state, buf)
buf
end
-
end
diff --git a/modules/encoders/mipsbe/byte_xori.rb b/modules/encoders/mipsbe/byte_xori.rb
index 2e72daf0c0..d81fa4658d 100644
--- a/modules/encoders/mipsbe/byte_xori.rb
+++ b/modules/encoders/mipsbe/byte_xori.rb
@@ -138,5 +138,4 @@ EOS
stub[-1, state.decoder_key_size] = [ real_key.to_i ].pack(state.decoder_key_pack)
return stub
end
-
end
diff --git a/modules/encoders/mipsbe/longxor.rb b/modules/encoders/mipsbe/longxor.rb
index d620f3c4c6..7f7e361421 100644
--- a/modules/encoders/mipsbe/longxor.rb
+++ b/modules/encoders/mipsbe/longxor.rb
@@ -140,5 +140,4 @@ EOS
return decoder
end
-
end
diff --git a/modules/encoders/mipsle/byte_xori.rb b/modules/encoders/mipsle/byte_xori.rb
index b45c8eb2b7..7f240c45ed 100644
--- a/modules/encoders/mipsle/byte_xori.rb
+++ b/modules/encoders/mipsle/byte_xori.rb
@@ -138,5 +138,4 @@ EOS
stub[-1, state.decoder_key_size] = [ real_key.to_i ].pack(state.decoder_key_pack)
return stub
end
-
end
diff --git a/modules/encoders/mipsle/longxor.rb b/modules/encoders/mipsle/longxor.rb
index 4495ca05e8..0560d7d2ae 100644
--- a/modules/encoders/mipsle/longxor.rb
+++ b/modules/encoders/mipsle/longxor.rb
@@ -140,5 +140,4 @@ EOS
return decoder
end
-
end
diff --git a/modules/encoders/php/base64.rb b/modules/encoders/php/base64.rb
index bb522c3012..601c18bec3 100644
--- a/modules/encoders/php/base64.rb
+++ b/modules/encoders/php/base64.rb
@@ -94,5 +94,4 @@ class MetasploitModule < Msf::Encoder
return "eval(base64_decode(" + b64 + "));"
end
-
end
diff --git a/modules/encoders/ppc/longxor.rb b/modules/encoders/ppc/longxor.rb
index b04774e665..215f30122e 100644
--- a/modules/encoders/ppc/longxor.rb
+++ b/modules/encoders/ppc/longxor.rb
@@ -63,5 +63,4 @@ class MetasploitModule < Msf::Encoder::Xor
stub
end
-
end
diff --git a/modules/encoders/ppc/longxor_tag.rb b/modules/encoders/ppc/longxor_tag.rb
index 41c21796d1..b8e5cb07af 100644
--- a/modules/encoders/ppc/longxor_tag.rb
+++ b/modules/encoders/ppc/longxor_tag.rb
@@ -63,5 +63,4 @@ class MetasploitModule < Msf::Encoder::Xor
def encode_end(state)
state.encoded += [ state.key.to_i ].pack('N')
end
-
end
diff --git a/modules/encoders/sparc/longxor_tag.rb b/modules/encoders/sparc/longxor_tag.rb
index 345101eedf..cd2d08fe52 100644
--- a/modules/encoders/sparc/longxor_tag.rb
+++ b/modules/encoders/sparc/longxor_tag.rb
@@ -56,5 +56,4 @@ class MetasploitModule < Msf::Encoder::XorAdditiveFeedback
badchars
) ? false : true)
end
-
end
diff --git a/modules/encoders/x64/xor.rb b/modules/encoders/x64/xor.rb
index 0801ae422e..a459fbd2b3 100644
--- a/modules/encoders/x64/xor.rb
+++ b/modules/encoders/x64/xor.rb
@@ -45,5 +45,4 @@ class MetasploitModule < Msf::Encoder::Xor
return decoder
end
-
end
diff --git a/modules/encoders/x86/avoid_underscore_tolower.rb b/modules/encoders/x86/avoid_underscore_tolower.rb
index eb441d2f78..f905d819d3 100644
--- a/modules/encoders/x86/avoid_underscore_tolower.rb
+++ b/modules/encoders/x86/avoid_underscore_tolower.rb
@@ -195,5 +195,4 @@ class MetasploitModule < Msf::Encoder
def is_badchar(state, val)
(val >= 0x41 and val <= 0x5a) or val == 0x5f or Rex::Text.badchar_index([val].pack('C'), state.badchars)
end
-
end
diff --git a/modules/encoders/x86/avoid_utf8_tolower.rb b/modules/encoders/x86/avoid_utf8_tolower.rb
index 703d06b347..c3f5964ed7 100644
--- a/modules/encoders/x86/avoid_utf8_tolower.rb
+++ b/modules/encoders/x86/avoid_utf8_tolower.rb
@@ -253,5 +253,4 @@ class MetasploitModule < Msf::Encoder
def is_badchar(state, val)
((val >= 0x41 and val <= 0x5a) or val >= 0x80) or Rex::Text.badchar_index([val].pack('C'), state.badchars)
end
-
end
diff --git a/modules/encoders/x86/bloxor.rb b/modules/encoders/x86/bloxor.rb
index e0b7d32555..6e201e1dbf 100644
--- a/modules/encoders/x86/bloxor.rb
+++ b/modules/encoders/x86/bloxor.rb
@@ -46,5 +46,4 @@ class MetasploitModule < Rex::Encoder::BloXor
super( state )
end
-
end
diff --git a/modules/encoders/x86/bmp_polyglot.rb b/modules/encoders/x86/bmp_polyglot.rb
index a5a27beb91..cf4f8d5b05 100644
--- a/modules/encoders/x86/bmp_polyglot.rb
+++ b/modules/encoders/x86/bmp_polyglot.rb
@@ -172,7 +172,6 @@ class SizeCalculator
def round_up_to_nop(opcode)
BYTE_NOPS.find { |nop| opcode <= nop }
end
-
end
class MetasploitModule < Msf::Encoder
diff --git a/modules/encoders/x86/call4_dword_xor.rb b/modules/encoders/x86/call4_dword_xor.rb
index 46e5adbdb7..818ad97edb 100644
--- a/modules/encoders/x86/call4_dword_xor.rb
+++ b/modules/encoders/x86/call4_dword_xor.rb
@@ -60,5 +60,4 @@ class MetasploitModule < Msf::Encoder::Xor
def saved_registers
Rex::Arch::X86.register_names_to_ids(datastore['SaveRegisters'])
end
-
end
diff --git a/modules/encoders/x86/context_cpuid.rb b/modules/encoders/x86/context_cpuid.rb
index 384a35c111..22d35ed3ba 100644
--- a/modules/encoders/x86/context_cpuid.rb
+++ b/modules/encoders/x86/context_cpuid.rb
@@ -193,5 +193,4 @@ protected
Rex::Arch::X86::ESP,
Rex::Arch::X86::ECX ], nil, state.badchars)
end
-
end
diff --git a/modules/encoders/x86/context_stat.rb b/modules/encoders/x86/context_stat.rb
index 6d387bd5c8..f463b6ee04 100644
--- a/modules/encoders/x86/context_stat.rb
+++ b/modules/encoders/x86/context_stat.rb
@@ -196,5 +196,4 @@ protected
Rex::Arch::X86::ESP,
Rex::Arch::X86::ECX ], nil, state.badchars)
end
-
end
diff --git a/modules/encoders/x86/context_time.rb b/modules/encoders/x86/context_time.rb
index 50190b566d..028e68ab1e 100644
--- a/modules/encoders/x86/context_time.rb
+++ b/modules/encoders/x86/context_time.rb
@@ -182,5 +182,4 @@ protected
Rex::Arch::X86::ESP,
Rex::Arch::X86::ECX ], nil, state.badchars)
end
-
end
diff --git a/modules/encoders/x86/jmp_call_additive.rb b/modules/encoders/x86/jmp_call_additive.rb
index d8516f152d..fc67ec09ff 100644
--- a/modules/encoders/x86/jmp_call_additive.rb
+++ b/modules/encoders/x86/jmp_call_additive.rb
@@ -42,5 +42,4 @@ class MetasploitModule < Msf::Encoder::XorAdditiveFeedback
def encode_end(state)
state.encoded += [ state.key ].pack(state.decoder_key_pack)
end
-
end
diff --git a/modules/encoders/x86/service.rb b/modules/encoders/x86/service.rb
index 97847946bb..ce47537064 100644
--- a/modules/encoders/x86/service.rb
+++ b/modules/encoders/x86/service.rb
@@ -128,5 +128,4 @@ class MetasploitModule < Msf::Encoder
return push_registers + code_service + pop_registers + block
end
-
end
diff --git a/modules/encoders/x86/shikata_ga_nai.rb b/modules/encoders/x86/shikata_ga_nai.rb
index e01b3f8cac..f6816deea3 100644
--- a/modules/encoders/x86/shikata_ga_nai.rb
+++ b/modules/encoders/x86/shikata_ga_nai.rb
@@ -311,5 +311,4 @@ protected
def dec(regnum)
[0x48 + regnum].pack('C')
end
-
end
diff --git a/modules/encoders/x86/single_static_bit.rb b/modules/encoders/x86/single_static_bit.rb
index 1ac9babb62..eb8d1d27d2 100644
--- a/modules/encoders/x86/single_static_bit.rb
+++ b/modules/encoders/x86/single_static_bit.rb
@@ -208,5 +208,4 @@ class MetasploitModule < Msf::Encoder
state.encoded.sub!(marker_str, enc_len_str)
state.encoded.sub!(marker_str, xor_key_str)
end
-
end
diff --git a/modules/encoders/x86/unicode_mixed.rb b/modules/encoders/x86/unicode_mixed.rb
index 2ec65944a4..6aa59f0faa 100644
--- a/modules/encoders/x86/unicode_mixed.rb
+++ b/modules/encoders/x86/unicode_mixed.rb
@@ -59,5 +59,4 @@ class MetasploitModule < Msf::Encoder::Alphanum
def to_native(buffer)
Rex::Text.to_unicode(buffer)
end
-
end
diff --git a/modules/encoders/x86/unicode_upper.rb b/modules/encoders/x86/unicode_upper.rb
index 8e79f271fe..fd998648c2 100644
--- a/modules/encoders/x86/unicode_upper.rb
+++ b/modules/encoders/x86/unicode_upper.rb
@@ -59,5 +59,4 @@ class MetasploitModule < Msf::Encoder::Alphanum
def to_native(buffer)
Rex::Text.to_unicode(buffer)
end
-
end
diff --git a/modules/exploits/aix/local/ibstat_path.rb b/modules/exploits/aix/local/ibstat_path.rb
index 0441d0f2ac..32877ff389 100644
--- a/modules/exploits/aix/local/ibstat_path.rb
+++ b/modules/exploits/aix/local/ibstat_path.rb
@@ -169,5 +169,4 @@ chmod 4555 #{root_file}
print_status("Exploit failed")
false
end
-
end
diff --git a/modules/exploits/aix/rpc_cmsd_opcode21.rb b/modules/exploits/aix/rpc_cmsd_opcode21.rb
index 30b659ce21..95768e9020 100644
--- a/modules/exploits/aix/rpc_cmsd_opcode21.rb
+++ b/modules/exploits/aix/rpc_cmsd_opcode21.rb
@@ -106,5 +106,4 @@ class MetasploitModule < Msf::Exploit::Remote
vprint_error('EOFError')
end
end
-
end
diff --git a/modules/exploits/aix/rpc_ttdbserverd_realpath.rb b/modules/exploits/aix/rpc_ttdbserverd_realpath.rb
index 83cb97e98d..e887eb939d 100644
--- a/modules/exploits/aix/rpc_ttdbserverd_realpath.rb
+++ b/modules/exploits/aix/rpc_ttdbserverd_realpath.rb
@@ -275,5 +275,4 @@ class MetasploitModule < Msf::Exploit::Remote
# print_error('EOFError')
end
end
-
end
diff --git a/modules/exploits/android/adb/adb_server_exec.rb b/modules/exploits/android/adb/adb_server_exec.rb
index 6d7709aec7..0b1bf629e6 100644
--- a/modules/exploits/android/adb/adb_server_exec.rb
+++ b/modules/exploits/android/adb/adb_server_exec.rb
@@ -80,5 +80,4 @@ class MetasploitModule < Msf::Exploit::Remote
disconnect
end
end
-
end
diff --git a/modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb b/modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb
index 0cc86f6678..735c65a5e4 100644
--- a/modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb
+++ b/modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb
@@ -1207,5 +1207,4 @@ Please wait while we locate your content...
details[my_target['Rop']]
end
-
end
diff --git a/modules/exploits/android/fileformat/adobe_reader_pdf_js_interface.rb b/modules/exploits/android/fileformat/adobe_reader_pdf_js_interface.rb
index 4be60ba2ac..c5fd35f3a2 100644
--- a/modules/exploits/android/fileformat/adobe_reader_pdf_js_interface.rb
+++ b/modules/exploits/android/fileformat/adobe_reader_pdf_js_interface.rb
@@ -132,5 +132,4 @@ class MetasploitModule < Msf::Exploit::Remote
@pdf
end
-
end
diff --git a/modules/exploits/android/local/put_user_vroot.rb b/modules/exploits/android/local/put_user_vroot.rb
index bdd8deb2bc..17c6d539da 100644
--- a/modules/exploits/android/local/put_user_vroot.rb
+++ b/modules/exploits/android/local/put_user_vroot.rb
@@ -74,6 +74,5 @@ class MetasploitModule < Msf::Exploit::Local
session.fs.file.rm(remote_file)
print_status("Waiting #{datastore['WfsDelay']} seconds for payload")
end
-
end
diff --git a/modules/exploits/apple_ios/browser/safari_libtiff.rb b/modules/exploits/apple_ios/browser/safari_libtiff.rb
index f0060e7ab6..130b2e6cb3 100644
--- a/modules/exploits/apple_ios/browser/safari_libtiff.rb
+++ b/modules/exploits/apple_ios/browser/safari_libtiff.rb
@@ -164,5 +164,4 @@ class MetasploitModule < Msf::Exploit::Remote
tiff << hehe
end
-
end
diff --git a/modules/exploits/apple_ios/email/mobilemail_libtiff.rb b/modules/exploits/apple_ios/email/mobilemail_libtiff.rb
index 3861999a27..b595528a75 100644
--- a/modules/exploits/apple_ios/email/mobilemail_libtiff.rb
+++ b/modules/exploits/apple_ios/email/mobilemail_libtiff.rb
@@ -166,5 +166,4 @@ class MetasploitModule < Msf::Exploit::Remote
tiff << hehe
end
-
end
diff --git a/modules/exploits/bsdi/softcart/mercantec_softcart.rb b/modules/exploits/bsdi/softcart/mercantec_softcart.rb
index cea02f4177..7e63d8ae54 100644
--- a/modules/exploits/bsdi/softcart/mercantec_softcart.rb
+++ b/modules/exploits/bsdi/softcart/mercantec_softcart.rb
@@ -85,5 +85,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
end
-
end
diff --git a/modules/exploits/dialup/multi/login/manyargs.rb b/modules/exploits/dialup/multi/login/manyargs.rb
index 2715190bad..b5ffdb6161 100644
--- a/modules/exploits/dialup/multi/login/manyargs.rb
+++ b/modules/exploits/dialup/multi/login/manyargs.rb
@@ -212,5 +212,4 @@ class MetasploitModule < Msf::Exploit::Remote
disconnect_dialup
end
-
end
diff --git a/modules/exploits/freebsd/ftp/proftp_telnet_iac.rb b/modules/exploits/freebsd/ftp/proftp_telnet_iac.rb
index becc932481..d20f9dcc74 100644
--- a/modules/exploits/freebsd/ftp/proftp_telnet_iac.rb
+++ b/modules/exploits/freebsd/ftp/proftp_telnet_iac.rb
@@ -204,5 +204,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
end
-
end
diff --git a/modules/exploits/freebsd/http/watchguard_cmd_exec.rb b/modules/exploits/freebsd/http/watchguard_cmd_exec.rb
index 8d7f6155ed..14022dafed 100644
--- a/modules/exploits/freebsd/http/watchguard_cmd_exec.rb
+++ b/modules/exploits/freebsd/http/watchguard_cmd_exec.rb
@@ -273,5 +273,4 @@ class MetasploitModule < Msf::Exploit::Remote
def autofilter
true
end
-
end
diff --git a/modules/exploits/freebsd/local/mmap.rb b/modules/exploits/freebsd/local/mmap.rb
index 37f3d708b3..9b4f52327a 100644
--- a/modules/exploits/freebsd/local/mmap.rb
+++ b/modules/exploits/freebsd/local/mmap.rb
@@ -106,5 +106,4 @@ class MetasploitModule < Msf::Exploit::Local
print_status("Executing #{exploit_fname}")
cmd_exec(exploit_fname)
end
-
end
diff --git a/modules/exploits/freebsd/local/watchguard_fix_corrupt_mail.rb b/modules/exploits/freebsd/local/watchguard_fix_corrupt_mail.rb
index 7c7f1f8d31..8e1994ed66 100644
--- a/modules/exploits/freebsd/local/watchguard_fix_corrupt_mail.rb
+++ b/modules/exploits/freebsd/local/watchguard_fix_corrupt_mail.rb
@@ -92,5 +92,4 @@ class MetasploitModule < Msf::Exploit::Local
register_file_for_cleanup(dummy_filename)
register_file_for_cleanup(filename)
end
-
end
diff --git a/modules/exploits/freebsd/misc/citrix_netscaler_soap_bof.rb b/modules/exploits/freebsd/misc/citrix_netscaler_soap_bof.rb
index 64dd0fff70..cfff023f74 100644
--- a/modules/exploits/freebsd/misc/citrix_netscaler_soap_bof.rb
+++ b/modules/exploits/freebsd/misc/citrix_netscaler_soap_bof.rb
@@ -161,5 +161,4 @@ class MetasploitModule < Msf::Exploit::Remote
c.put(pkt)
c.disconnect
end
-
end
diff --git a/modules/exploits/freebsd/samba/trans2open.rb b/modules/exploits/freebsd/samba/trans2open.rb
index a24a21b1f3..9738cc34a7 100644
--- a/modules/exploits/freebsd/samba/trans2open.rb
+++ b/modules/exploits/freebsd/samba/trans2open.rb
@@ -129,5 +129,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
-
end
diff --git a/modules/exploits/freebsd/tacacs/xtacacsd_report.rb b/modules/exploits/freebsd/tacacs/xtacacsd_report.rb
index 5da0687e6f..530f4a5608 100644
--- a/modules/exploits/freebsd/tacacs/xtacacsd_report.rb
+++ b/modules/exploits/freebsd/tacacs/xtacacsd_report.rb
@@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote
disconnect_udp
end
-
end
diff --git a/modules/exploits/freebsd/telnet/telnet_encrypt_keyid.rb b/modules/exploits/freebsd/telnet/telnet_encrypt_keyid.rb
index 32da810af9..87bf1b0aae 100644
--- a/modules/exploits/freebsd/telnet/telnet_encrypt_keyid.rb
+++ b/modules/exploits/freebsd/telnet/telnet_encrypt_keyid.rb
@@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote
::IO.select(nil, nil, nil, 0.5)
disconnect
end
-
end
diff --git a/modules/exploits/hpux/lpd/cleanup_exec.rb b/modules/exploits/hpux/lpd/cleanup_exec.rb
index 9e7ff6dadd..06d8f8a8c9 100644
--- a/modules/exploits/hpux/lpd/cleanup_exec.rb
+++ b/modules/exploits/hpux/lpd/cleanup_exec.rb
@@ -94,5 +94,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
-
end
diff --git a/modules/exploits/irix/lpd/tagprinter_exec.rb b/modules/exploits/irix/lpd/tagprinter_exec.rb
index e3ff4a8515..45f2c54be3 100644
--- a/modules/exploits/irix/lpd/tagprinter_exec.rb
+++ b/modules/exploits/irix/lpd/tagprinter_exec.rb
@@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
print_status("Payload: #{payload.encoded}")
end
-
end
diff --git a/modules/exploits/linux/antivirus/escan_password_exec.rb b/modules/exploits/linux/antivirus/escan_password_exec.rb
index 8ad8b40e20..1e37d9363c 100644
--- a/modules/exploits/linux/antivirus/escan_password_exec.rb
+++ b/modules/exploits/linux/antivirus/escan_password_exec.rb
@@ -163,5 +163,4 @@ class MetasploitModule < Msf::Exploit::Remote
}
}, timeout)
end
-
end
diff --git a/modules/exploits/linux/ftp/proftp_sreplace.rb b/modules/exploits/linux/ftp/proftp_sreplace.rb
index 6a615feacc..c536f588df 100644
--- a/modules/exploits/linux/ftp/proftp_sreplace.rb
+++ b/modules/exploits/linux/ftp/proftp_sreplace.rb
@@ -229,5 +229,4 @@ class MetasploitModule < Msf::Exploit::Remote
disconnect
end
-
end
diff --git a/modules/exploits/linux/ftp/proftp_telnet_iac.rb b/modules/exploits/linux/ftp/proftp_telnet_iac.rb
index 9e99fa1409..6013bf3554 100644
--- a/modules/exploits/linux/ftp/proftp_telnet_iac.rb
+++ b/modules/exploits/linux/ftp/proftp_telnet_iac.rb
@@ -437,5 +437,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
end
-
end
diff --git a/modules/exploits/linux/games/ut2004_secure.rb b/modules/exploits/linux/games/ut2004_secure.rb
index 174e8527ff..a23c4d5757 100644
--- a/modules/exploits/linux/games/ut2004_secure.rb
+++ b/modules/exploits/linux/games/ut2004_secure.rb
@@ -109,5 +109,4 @@ class MetasploitModule < Msf::Exploit::Remote
vprint_status("This system appears to be patched")
return Exploit::CheckCode::Safe
end
-
end
diff --git a/modules/exploits/linux/http/accellion_fta_getstatus_oauth.rb b/modules/exploits/linux/http/accellion_fta_getstatus_oauth.rb
index 5d8080941c..f5e6400989 100644
--- a/modules/exploits/linux/http/accellion_fta_getstatus_oauth.rb
+++ b/modules/exploits/linux/http/accellion_fta_getstatus_oauth.rb
@@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
end
-
end
diff --git a/modules/exploits/linux/http/advantech_switch_bash_env_exec.rb b/modules/exploits/linux/http/advantech_switch_bash_env_exec.rb
index 9fd18555bd..db40af827c 100644
--- a/modules/exploits/linux/http/advantech_switch_bash_env_exec.rb
+++ b/modules/exploits/linux/http/advantech_switch_bash_env_exec.rb
@@ -96,5 +96,4 @@ class MetasploitModule < Msf::Exploit::Remote
'agent' => cmd
)
end
-
end
diff --git a/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb b/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb
index 159f997464..2ffb9e3d48 100644
--- a/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb
+++ b/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb
@@ -79,5 +79,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
disconnect
end
-
end
diff --git a/modules/exploits/linux/http/alienvault_sqli_exec.rb b/modules/exploits/linux/http/alienvault_sqli_exec.rb
index bf901cd253..86a018a49d 100644
--- a/modules/exploits/linux/http/alienvault_sqli_exec.rb
+++ b/modules/exploits/linux/http/alienvault_sqli_exec.rb
@@ -350,5 +350,4 @@ class MetasploitModule < Msf::Exploit::Remote
super # mixins should be able to cleanup even in case of Exception
end
end
-
end
diff --git a/modules/exploits/linux/http/apache_continuum_cmd_exec.rb b/modules/exploits/linux/http/apache_continuum_cmd_exec.rb
index 7be19d0f56..f31253a6d4 100644
--- a/modules/exploits/linux/http/apache_continuum_cmd_exec.rb
+++ b/modules/exploits/linux/http/apache_continuum_cmd_exec.rb
@@ -71,5 +71,4 @@ class MetasploitModule < Msf::Exploit::Remote
}
)
end
-
end
diff --git a/modules/exploits/linux/http/astium_sqli_upload.rb b/modules/exploits/linux/http/astium_sqli_upload.rb
index e1f32bea2a..35c6aa4fe2 100644
--- a/modules/exploits/linux/http/astium_sqli_upload.rb
+++ b/modules/exploits/linux/http/astium_sqli_upload.rb
@@ -180,5 +180,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
-
end
diff --git a/modules/exploits/linux/http/centreon_sqli_exec.rb b/modules/exploits/linux/http/centreon_sqli_exec.rb
index 7c6c4e8779..b16266a542 100644
--- a/modules/exploits/linux/http/centreon_sqli_exec.rb
+++ b/modules/exploits/linux/http/centreon_sqli_exec.rb
@@ -133,5 +133,4 @@ class MetasploitModule < Msf::Exploit::Remote
payload.encoded.each_byte { |c| p << "#{c},"}
p
end
-
end
diff --git a/modules/exploits/linux/http/cisco_firepower_useradd.rb b/modules/exploits/linux/http/cisco_firepower_useradd.rb
index 0364f14f54..0cd9d5307c 100644
--- a/modules/exploits/linux/http/cisco_firepower_useradd.rb
+++ b/modules/exploits/linux/http/cisco_firepower_useradd.rb
@@ -261,5 +261,4 @@ class MetasploitModule < Msf::Exploit::Remote
@ssh_socket.close
end
end
-
end
diff --git a/modules/exploits/linux/http/ddwrt_cgibin_exec.rb b/modules/exploits/linux/http/ddwrt_cgibin_exec.rb
index ddb37d3a72..c14570454b 100644
--- a/modules/exploits/linux/http/ddwrt_cgibin_exec.rb
+++ b/modules/exploits/linux/http/ddwrt_cgibin_exec.rb
@@ -63,5 +63,4 @@ class MetasploitModule < Msf::Exploit::Remote
select(nil, nil, nil, 10.0)
end
-
end
diff --git a/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb b/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb
index 61535552ac..0aecb6afd6 100644
--- a/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb
+++ b/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb
@@ -148,5 +148,4 @@ class MetasploitModule < Msf::Exploit::Remote
return nil
end
end
-
end
diff --git a/modules/exploits/linux/http/dlink_diagnostic_exec_noauth.rb b/modules/exploits/linux/http/dlink_diagnostic_exec_noauth.rb
index a117ca7577..0fecd7c49b 100644
--- a/modules/exploits/linux/http/dlink_diagnostic_exec_noauth.rb
+++ b/modules/exploits/linux/http/dlink_diagnostic_exec_noauth.rb
@@ -218,5 +218,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
end
-
end
diff --git a/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb b/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb
index e8780131a5..1634db4e6f 100644
--- a/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb
+++ b/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb
@@ -192,5 +192,4 @@ class MetasploitModule < Msf::Exploit::Remote
return nil
end
end
-
end
diff --git a/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb b/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb
index e69621529f..0a1e806271 100644
--- a/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb
+++ b/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb
@@ -121,5 +121,4 @@ class MetasploitModule < Msf::Exploit::Remote
})
end
-
end
diff --git a/modules/exploits/linux/http/dlink_dir615_up_exec.rb b/modules/exploits/linux/http/dlink_dir615_up_exec.rb
index 69650003f6..c494b6352d 100644
--- a/modules/exploits/linux/http/dlink_dir615_up_exec.rb
+++ b/modules/exploits/linux/http/dlink_dir615_up_exec.rb
@@ -254,5 +254,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
end
-
end
diff --git a/modules/exploits/linux/http/efw_chpasswd_exec.rb b/modules/exploits/linux/http/efw_chpasswd_exec.rb
index 610ba17a64..e75c5e8b4a 100644
--- a/modules/exploits/linux/http/efw_chpasswd_exec.rb
+++ b/modules/exploits/linux/http/efw_chpasswd_exec.rb
@@ -164,5 +164,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
-
end
diff --git a/modules/exploits/linux/http/esva_exec.rb b/modules/exploits/linux/http/esva_exec.rb
index ad58d7a292..11795f9e8f 100644
--- a/modules/exploits/linux/http/esva_exec.rb
+++ b/modules/exploits/linux/http/esva_exec.rb
@@ -89,5 +89,4 @@ class MetasploitModule < Msf::Exploit::Remote
print_good("Command executed successfully")
print_status("Output: \n#{res.body.split("Learned tokens")[0]}")
end
-
end
diff --git a/modules/exploits/linux/http/github_enterprise_secret.rb b/modules/exploits/linux/http/github_enterprise_secret.rb
index ba914ba612..c068b867d0 100644
--- a/modules/exploits/linux/http/github_enterprise_secret.rb
+++ b/modules/exploits/linux/http/github_enterprise_secret.rb
@@ -164,7 +164,6 @@ class MetasploitModule < Msf::Exploit::Remote
print_status('Sending serialized Ruby stager...')
send_serialized_data(dump, hmac)
end
-
end
=begin
diff --git a/modules/exploits/linux/http/gitlist_exec.rb b/modules/exploits/linux/http/gitlist_exec.rb
index 1049eb3046..7aa0e8bdce 100644
--- a/modules/exploits/linux/http/gitlist_exec.rb
+++ b/modules/exploits/linux/http/gitlist_exec.rb
@@ -113,5 +113,4 @@ class MetasploitModule < Msf::Exploit::Remote
res
end
-
end
diff --git a/modules/exploits/linux/http/gpsd_format_string.rb b/modules/exploits/linux/http/gpsd_format_string.rb
index eb3d216918..10c29b1012 100644
--- a/modules/exploits/linux/http/gpsd_format_string.rb
+++ b/modules/exploits/linux/http/gpsd_format_string.rb
@@ -93,5 +93,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
disconnect
end
-
end
diff --git a/modules/exploits/linux/http/hp_system_management.rb b/modules/exploits/linux/http/hp_system_management.rb
index bed5b5fe76..ce2c32c0ab 100644
--- a/modules/exploits/linux/http/hp_system_management.rb
+++ b/modules/exploits/linux/http/hp_system_management.rb
@@ -98,5 +98,4 @@ class MetasploitModule < Msf::Exploit::Remote
})
end
-
end
diff --git a/modules/exploits/linux/http/kloxo_sqli.rb b/modules/exploits/linux/http/kloxo_sqli.rb
index 58c6d06ce4..1f1bf2364c 100644
--- a/modules/exploits/linux/http/kloxo_sqli.rb
+++ b/modules/exploits/linux/http/kloxo_sqli.rb
@@ -264,5 +264,4 @@ class MetasploitModule < Msf::Exploit::Remote
vprint_warning("Unknown fingerprint while exploiting SQLi... be careful")
false
end
-
end
diff --git a/modules/exploits/linux/http/linksys_apply_cgi.rb b/modules/exploits/linux/http/linksys_apply_cgi.rb
index 719a939656..cd8ed3e429 100644
--- a/modules/exploits/linux/http/linksys_apply_cgi.rb
+++ b/modules/exploits/linux/http/linksys_apply_cgi.rb
@@ -96,5 +96,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
disconnect
end
-
end
diff --git a/modules/exploits/linux/http/linksys_e1500_apply_exec.rb b/modules/exploits/linux/http/linksys_e1500_apply_exec.rb
index 473286c54e..fe94db9b1a 100644
--- a/modules/exploits/linux/http/linksys_e1500_apply_exec.rb
+++ b/modules/exploits/linux/http/linksys_e1500_apply_exec.rb
@@ -247,5 +247,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
end
-
end
diff --git a/modules/exploits/linux/http/linksys_themoon_exec.rb b/modules/exploits/linux/http/linksys_themoon_exec.rb
index 9626c4abdc..7af10a0f1c 100644
--- a/modules/exploits/linux/http/linksys_themoon_exec.rb
+++ b/modules/exploits/linux/http/linksys_themoon_exec.rb
@@ -117,5 +117,4 @@ class MetasploitModule < Msf::Exploit::Remote
print_status("Exploiting...")
execute_cmdstager({:flavor => :wget})
end
-
end
diff --git a/modules/exploits/linux/http/linksys_wrt54gl_apply_exec.rb b/modules/exploits/linux/http/linksys_wrt54gl_apply_exec.rb
index ee473f6827..0445cc84d3 100644
--- a/modules/exploits/linux/http/linksys_wrt54gl_apply_exec.rb
+++ b/modules/exploits/linux/http/linksys_wrt54gl_apply_exec.rb
@@ -413,5 +413,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
end
-
end
diff --git a/modules/exploits/linux/http/mutiny_frontend_upload.rb b/modules/exploits/linux/http/mutiny_frontend_upload.rb
index 3536557ce6..22c9a6c019 100644
--- a/modules/exploits/linux/http/mutiny_frontend_upload.rb
+++ b/modules/exploits/linux/http/mutiny_frontend_upload.rb
@@ -192,5 +192,4 @@ class MetasploitModule < Msf::Exploit::Remote
jspraw
end
-
end
diff --git a/modules/exploits/linux/http/nagios_xi_chained_rce.rb b/modules/exploits/linux/http/nagios_xi_chained_rce.rb
index 24cbab9cdb..b1e21ae315 100644
--- a/modules/exploits/linux/http/nagios_xi_chained_rce.rb
+++ b/modules/exploits/linux/http/nagios_xi_chained_rce.rb
@@ -275,5 +275,4 @@ class MetasploitModule < Msf::Exploit::Remote
def zip_filename
@zip_filename ||= Rex::Text.rand_text_alpha(8) + '.zip'
end
-
end
diff --git a/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb b/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb
index 18d77277ea..cbfec50c45 100644
--- a/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb
+++ b/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb
@@ -251,5 +251,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
end
-
end
diff --git a/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb b/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb
index d80ae85c0d..0ac75af395 100644
--- a/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb
+++ b/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb
@@ -356,5 +356,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
end
-
end
diff --git a/modules/exploits/linux/http/netgear_r7000_cgibin_exec.rb b/modules/exploits/linux/http/netgear_r7000_cgibin_exec.rb
index 3c788d53b4..c61d48859f 100644
--- a/modules/exploits/linux/http/netgear_r7000_cgibin_exec.rb
+++ b/modules/exploits/linux/http/netgear_r7000_cgibin_exec.rb
@@ -97,5 +97,4 @@ class MetasploitModule < Msf::Exploit::Remote
super
end
end
-
end
diff --git a/modules/exploits/linux/http/netgear_readynas_exec.rb b/modules/exploits/linux/http/netgear_readynas_exec.rb
index 809079bbcc..dbf3780286 100644
--- a/modules/exploits/linux/http/netgear_readynas_exec.rb
+++ b/modules/exploits/linux/http/netgear_readynas_exec.rb
@@ -90,5 +90,4 @@ class MetasploitModule < Msf::Exploit::Remote
print_status("Executing payload...")
send_request_payload(my_payload)
end
-
end
diff --git a/modules/exploits/linux/http/pandora_fms_exec.rb b/modules/exploits/linux/http/pandora_fms_exec.rb
index bab22f8f39..decaffc7b3 100644
--- a/modules/exploits/linux/http/pandora_fms_exec.rb
+++ b/modules/exploits/linux/http/pandora_fms_exec.rb
@@ -107,5 +107,4 @@ class MetasploitModule < Msf::Exploit::Remote
fail_with(Failure::Unknown, "#{peer} - Unexpected response, exploit probably failed!")
end
end
-
end
diff --git a/modules/exploits/linux/http/peercast_url.rb b/modules/exploits/linux/http/peercast_url.rb
index 07017aea9e..58ae6185e5 100644
--- a/modules/exploits/linux/http/peercast_url.rb
+++ b/modules/exploits/linux/http/peercast_url.rb
@@ -61,5 +61,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
disconnect
end
-
end
diff --git a/modules/exploits/linux/http/pineapp_ldapsyncnow_exec.rb b/modules/exploits/linux/http/pineapp_ldapsyncnow_exec.rb
index 9802d6ff14..34d2e9625b 100644
--- a/modules/exploits/linux/http/pineapp_ldapsyncnow_exec.rb
+++ b/modules/exploits/linux/http/pineapp_ldapsyncnow_exec.rb
@@ -91,5 +91,4 @@ class MetasploitModule < Msf::Exploit::Remote
}
})
end
-
end
diff --git a/modules/exploits/linux/http/pineapp_livelog_exec.rb b/modules/exploits/linux/http/pineapp_livelog_exec.rb
index ec2d79113c..c9192c547f 100644
--- a/modules/exploits/linux/http/pineapp_livelog_exec.rb
+++ b/modules/exploits/linux/http/pineapp_livelog_exec.rb
@@ -94,5 +94,4 @@ class MetasploitModule < Msf::Exploit::Remote
}
})
end
-
end
diff --git a/modules/exploits/linux/http/pineapp_test_li_conn_exec.rb b/modules/exploits/linux/http/pineapp_test_li_conn_exec.rb
index a4488c591d..dbc341daff 100644
--- a/modules/exploits/linux/http/pineapp_test_li_conn_exec.rb
+++ b/modules/exploits/linux/http/pineapp_test_li_conn_exec.rb
@@ -110,5 +110,4 @@ class MetasploitModule < Msf::Exploit::Remote
}
})
end
-
end
diff --git a/modules/exploits/linux/http/piranha_passwd_exec.rb b/modules/exploits/linux/http/piranha_passwd_exec.rb
index 6fc5a46367..10d7d39a25 100644
--- a/modules/exploits/linux/http/piranha_passwd_exec.rb
+++ b/modules/exploits/linux/http/piranha_passwd_exec.rb
@@ -95,5 +95,4 @@ class MetasploitModule < Msf::Exploit::Remote
print_status("Command successfully executed (according to the server).")
end
end
-
end
diff --git a/modules/exploits/linux/http/realtek_miniigd_upnp_exec_noauth.rb b/modules/exploits/linux/http/realtek_miniigd_upnp_exec_noauth.rb
index 699df3e14c..f82e71f2a0 100644
--- a/modules/exploits/linux/http/realtek_miniigd_upnp_exec_noauth.rb
+++ b/modules/exploits/linux/http/realtek_miniigd_upnp_exec_noauth.rb
@@ -161,5 +161,4 @@ class MetasploitModule < Msf::Exploit::Remote
xml.to_s
end
-
end
diff --git a/modules/exploits/linux/http/riverbed_netprofiler_netexpress_exec.rb b/modules/exploits/linux/http/riverbed_netprofiler_netexpress_exec.rb
index a68551e0cf..9240c6fe03 100644
--- a/modules/exploits/linux/http/riverbed_netprofiler_netexpress_exec.rb
+++ b/modules/exploits/linux/http/riverbed_netprofiler_netexpress_exec.rb
@@ -280,5 +280,4 @@ class MetasploitModule < Msf::Exploit::Remote
@elf_sent = true
send_response(cli, @pl)
end
-
end
diff --git a/modules/exploits/linux/http/seagate_nas_php_exec_noauth.rb b/modules/exploits/linux/http/seagate_nas_php_exec_noauth.rb
index 8478215a38..3782fa43a9 100644
--- a/modules/exploits/linux/http/seagate_nas_php_exec_noauth.rb
+++ b/modules/exploits/linux/http/seagate_nas_php_exec_noauth.rb
@@ -349,5 +349,4 @@ class MetasploitModule < Msf::Exploit::Remote
def xml_encode(str)
str.gsub(/, '<').gsub(/>/, '>')
end
-
end
diff --git a/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb b/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb
index 8da1673419..3d476cdf08 100644
--- a/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb
+++ b/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb
@@ -123,5 +123,4 @@ class MetasploitModule < Msf::Exploit::Remote
print_status("Sending exploit...")
send_close_window_request(buffer, payload.encoded)
end
-
end
diff --git a/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb b/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb
index 87c72539e9..87385067e1 100644
--- a/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb
+++ b/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb
@@ -109,5 +109,4 @@ class MetasploitModule < Msf::Exploit::Remote
return res
end
-
end
diff --git a/modules/exploits/linux/http/symantec_messaging_gateway_exec.rb b/modules/exploits/linux/http/symantec_messaging_gateway_exec.rb
index 7ed2691a14..e8a0eec85b 100644
--- a/modules/exploits/linux/http/symantec_messaging_gateway_exec.rb
+++ b/modules/exploits/linux/http/symantec_messaging_gateway_exec.rb
@@ -198,5 +198,4 @@ class MetasploitModule < Msf::Exploit::Remote
}
})
end
-
end
diff --git a/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb b/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb
index a52a5a63d4..48837f17a5 100644
--- a/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb
+++ b/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb
@@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote
print_status("Server returned #{res.code.to_s}")
end
end
-
end
diff --git a/modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb b/modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb
index e849f5dcec..a494d0353a 100644
--- a/modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb
+++ b/modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb
@@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
end
-
end
diff --git a/modules/exploits/linux/http/symantec_web_gateway_restore.rb b/modules/exploits/linux/http/symantec_web_gateway_restore.rb
index 3f41b288dd..1aec7aad7f 100644
--- a/modules/exploits/linux/http/symantec_web_gateway_restore.rb
+++ b/modules/exploits/linux/http/symantec_web_gateway_restore.rb
@@ -208,5 +208,4 @@ class MetasploitModule < Msf::Exploit::Remote
print_status("Trying restore.php...")
inject_exec(sid)
end
-
end
diff --git a/modules/exploits/linux/http/tiki_calendar_exec.rb b/modules/exploits/linux/http/tiki_calendar_exec.rb
index 2f006eb839..54ebf0d1c9 100644
--- a/modules/exploits/linux/http/tiki_calendar_exec.rb
+++ b/modules/exploits/linux/http/tiki_calendar_exec.rb
@@ -149,5 +149,4 @@ class MetasploitModule < Msf::Exploit::Remote
fail_with(Failure::NoAccess, "#{peer} - Additional Permissions Required")
end
end
-
end
diff --git a/modules/exploits/linux/http/tr064_ntpserver_cmdinject.rb b/modules/exploits/linux/http/tr064_ntpserver_cmdinject.rb
index b2004d7d2e..a13fc5ebd4 100644
--- a/modules/exploits/linux/http/tr064_ntpserver_cmdinject.rb
+++ b/modules/exploits/linux/http/tr064_ntpserver_cmdinject.rb
@@ -140,5 +140,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
-
end
diff --git a/modules/exploits/linux/http/trend_micro_imsva_exec.rb b/modules/exploits/linux/http/trend_micro_imsva_exec.rb
index 2b9bc1009a..de341d3de0 100644
--- a/modules/exploits/linux/http/trend_micro_imsva_exec.rb
+++ b/modules/exploits/linux/http/trend_micro_imsva_exec.rb
@@ -143,5 +143,4 @@ class MetasploitModule < Msf::Exploit::Remote
}
})
end
-
end
diff --git a/modules/exploits/linux/http/wanem_exec.rb b/modules/exploits/linux/http/wanem_exec.rb
index 3e4d6a88d2..f7a2f1a222 100644
--- a/modules/exploits/linux/http/wanem_exec.rb
+++ b/modules/exploits/linux/http/wanem_exec.rb
@@ -106,5 +106,4 @@ class MetasploitModule < Msf::Exploit::Remote
print_error("Sending payload failed")
end
end
-
end
diff --git a/modules/exploits/linux/http/wipg1000_cmd_injection.rb b/modules/exploits/linux/http/wipg1000_cmd_injection.rb
index aae9b1128d..211177eddc 100644
--- a/modules/exploits/linux/http/wipg1000_cmd_injection.rb
+++ b/modules/exploits/linux/http/wipg1000_cmd_injection.rb
@@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote
}
)
end
-
end
diff --git a/modules/exploits/linux/http/zen_load_balancer_exec.rb b/modules/exploits/linux/http/zen_load_balancer_exec.rb
index a0acafb5cf..0bad938070 100644
--- a/modules/exploits/linux/http/zen_load_balancer_exec.rb
+++ b/modules/exploits/linux/http/zen_load_balancer_exec.rb
@@ -114,5 +114,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
-
end
diff --git a/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb b/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb
index c10168dc4e..f3143ad3af 100644
--- a/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb
+++ b/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb
@@ -105,6 +105,5 @@ class MetasploitModule < Msf::Exploit::Remote
handler
end
-
end
diff --git a/modules/exploits/linux/ids/alienvault_centerd_soap_exec.rb b/modules/exploits/linux/ids/alienvault_centerd_soap_exec.rb
index 7074b39aa1..3167c471b9 100644
--- a/modules/exploits/linux/ids/alienvault_centerd_soap_exec.rb
+++ b/modules/exploits/linux/ids/alienvault_centerd_soap_exec.rb
@@ -135,5 +135,4 @@ class MetasploitModule < Msf::Exploit::Remote
res
end
-
end
diff --git a/modules/exploits/linux/ids/snortbopre.rb b/modules/exploits/linux/ids/snortbopre.rb
index b4a69eedc8..2db5272f3b 100644
--- a/modules/exploits/linux/ids/snortbopre.rb
+++ b/modules/exploits/linux/ids/snortbopre.rb
@@ -95,5 +95,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
disconnect_udp
end
-
end
diff --git a/modules/exploits/linux/imap/imap_uw_lsub.rb b/modules/exploits/linux/imap/imap_uw_lsub.rb
index 647aeba29b..5e94a5699b 100644
--- a/modules/exploits/linux/imap/imap_uw_lsub.rb
+++ b/modules/exploits/linux/imap/imap_uw_lsub.rb
@@ -83,5 +83,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
disconnect
end
-
end
diff --git a/modules/exploits/linux/local/docker_daemon_privilege_escalation.rb b/modules/exploits/linux/local/docker_daemon_privilege_escalation.rb
index cb288ed06b..bf57e801e0 100644
--- a/modules/exploits/linux/local/docker_daemon_privilege_escalation.rb
+++ b/modules/exploits/linux/local/docker_daemon_privilege_escalation.rb
@@ -70,5 +70,4 @@ class MetasploitModule < Msf::Exploit::Local
#{exploit_path}
}.strip.split("\n").map(&:strip).join(';')
end
-
end
diff --git a/modules/exploits/linux/local/hp_smhstart.rb b/modules/exploits/linux/local/hp_smhstart.rb
index 837342c3b8..55f9dcb714 100644
--- a/modules/exploits/linux/local/hp_smhstart.rb
+++ b/modules/exploits/linux/local/hp_smhstart.rb
@@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Local
cmd_exec("export SSL_SHARE_BASE_DIR=$(echo -n '#{exploit_encoded}' | base64 -d)")
cmd_exec("#{datastore['smhstartDir']}/smhstart")
end
-
end
diff --git a/modules/exploits/linux/local/kloxo_lxsuexec.rb b/modules/exploits/linux/local/kloxo_lxsuexec.rb
index cf11e38b7a..0bbe6f1aef 100644
--- a/modules/exploits/linux/local/kloxo_lxsuexec.rb
+++ b/modules/exploits/linux/local/kloxo_lxsuexec.rb
@@ -103,5 +103,4 @@ class MetasploitModule < Msf::Exploit::Local
register_file_for_cleanup(helper_path)
cmd_exec("lxsuexec #{helper_path}")
end
-
end
diff --git a/modules/exploits/linux/local/sock_sendpage.rb b/modules/exploits/linux/local/sock_sendpage.rb
index 082f20fd45..28232b8bf2 100644
--- a/modules/exploits/linux/local/sock_sendpage.rb
+++ b/modules/exploits/linux/local/sock_sendpage.rb
@@ -445,5 +445,4 @@ int main(int argc, char **argv) {
output.each_line { |line| vprint_status(line.chomp) }
end
-
end
diff --git a/modules/exploits/linux/local/vmware_mount.rb b/modules/exploits/linux/local/vmware_mount.rb
index fa4becdbbb..5bca0c09be 100644
--- a/modules/exploits/linux/local/vmware_mount.rb
+++ b/modules/exploits/linux/local/vmware_mount.rb
@@ -82,6 +82,5 @@ class MetasploitModule < Msf::Exploit::Local
def setuid?(remote_file)
!!(cmd_exec("test -u #{remote_file.strip} && echo true").index "true")
end
-
end
diff --git a/modules/exploits/linux/misc/accellion_fta_mpipe2.rb b/modules/exploits/linux/misc/accellion_fta_mpipe2.rb
index 2778f37a81..545f95b452 100644
--- a/modules/exploits/linux/misc/accellion_fta_mpipe2.rb
+++ b/modules/exploits/linux/misc/accellion_fta_mpipe2.rb
@@ -149,5 +149,4 @@ class MetasploitModule < Msf::Exploit::Remote
"RandomIV" + iv + c.update(data) + c.final
end
-
end
diff --git a/modules/exploits/linux/misc/drb_remote_codeexec.rb b/modules/exploits/linux/misc/drb_remote_codeexec.rb
index 7865bae58d..1996a08426 100644
--- a/modules/exploits/linux/misc/drb_remote_codeexec.rb
+++ b/modules/exploits/linux/misc/drb_remote_codeexec.rb
@@ -65,5 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
p.send(:my_eval, payload.encoded)
end
-
end
diff --git a/modules/exploits/linux/misc/gld_postfix.rb b/modules/exploits/linux/misc/gld_postfix.rb
index a277f5f9c7..ea0cd5b635 100644
--- a/modules/exploits/linux/misc/gld_postfix.rb
+++ b/modules/exploits/linux/misc/gld_postfix.rb
@@ -61,5 +61,4 @@ class MetasploitModule < Msf::Exploit::Remote
disconnect
end
-
end
diff --git a/modules/exploits/linux/misc/hikvision_rtsp_bof.rb b/modules/exploits/linux/misc/hikvision_rtsp_bof.rb
index 3be6de75c1..d52fe1c4f2 100644
--- a/modules/exploits/linux/misc/hikvision_rtsp_bof.rb
+++ b/modules/exploits/linux/misc/hikvision_rtsp_bof.rb
@@ -134,5 +134,4 @@ class MetasploitModule < Msf::Exploit::Remote
def rport
datastore['RPORT']
end
-
end
diff --git a/modules/exploits/linux/misc/hp_data_protector_cmd_exec.rb b/modules/exploits/linux/misc/hp_data_protector_cmd_exec.rb
index a46882dc28..0eda3c19fc 100644
--- a/modules/exploits/linux/misc/hp_data_protector_cmd_exec.rb
+++ b/modules/exploits/linux/misc/hp_data_protector_cmd_exec.rb
@@ -103,5 +103,4 @@ class MetasploitModule < Msf::Exploit::Remote
disconnect
end
end
-
end
diff --git a/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb b/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb
index c138f55443..6eb489cebd 100644
--- a/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb
+++ b/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb
@@ -221,5 +221,4 @@ class MetasploitModule < Msf::Exploit::Remote
nil
end
-
end
diff --git a/modules/exploits/linux/misc/hp_vsa_login_bof.rb b/modules/exploits/linux/misc/hp_vsa_login_bof.rb
index 8bda606175..5b7da3bdf4 100644
--- a/modules/exploits/linux/misc/hp_vsa_login_bof.rb
+++ b/modules/exploits/linux/misc/hp_vsa_login_bof.rb
@@ -107,6 +107,5 @@ class MetasploitModule < Msf::Exploit::Remote
sock.put(packet)
disconnect
end
-
end
diff --git a/modules/exploits/linux/misc/hplip_hpssd_exec.rb b/modules/exploits/linux/misc/hplip_hpssd_exec.rb
index 593308af09..c19287ef49 100644
--- a/modules/exploits/linux/misc/hplip_hpssd_exec.rb
+++ b/modules/exploits/linux/misc/hplip_hpssd_exec.rb
@@ -89,5 +89,4 @@ class MetasploitModule < Msf::Exploit::Remote
sock.put(msg)
end
-
end
diff --git a/modules/exploits/linux/misc/ib_inet_connect.rb b/modules/exploits/linux/misc/ib_inet_connect.rb
index 5a82d4a7d3..313b77c1d1 100644
--- a/modules/exploits/linux/misc/ib_inet_connect.rb
+++ b/modules/exploits/linux/misc/ib_inet_connect.rb
@@ -117,5 +117,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
end
-
end
diff --git a/modules/exploits/linux/misc/ib_jrd8_create_database.rb b/modules/exploits/linux/misc/ib_jrd8_create_database.rb
index 2fbe767d0e..179146aaeb 100644
--- a/modules/exploits/linux/misc/ib_jrd8_create_database.rb
+++ b/modules/exploits/linux/misc/ib_jrd8_create_database.rb
@@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
end
-
end
diff --git a/modules/exploits/linux/misc/ib_open_marker_file.rb b/modules/exploits/linux/misc/ib_open_marker_file.rb
index 5cb30b1127..10a962aa71 100644
--- a/modules/exploits/linux/misc/ib_open_marker_file.rb
+++ b/modules/exploits/linux/misc/ib_open_marker_file.rb
@@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
end
-
end
diff --git a/modules/exploits/linux/misc/ib_pwd_db_aliased.rb b/modules/exploits/linux/misc/ib_pwd_db_aliased.rb
index 00c5b6671b..c6403c1839 100644
--- a/modules/exploits/linux/misc/ib_pwd_db_aliased.rb
+++ b/modules/exploits/linux/misc/ib_pwd_db_aliased.rb
@@ -106,5 +106,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
end
-
end
diff --git a/modules/exploits/linux/misc/jenkins_java_deserialize.rb b/modules/exploits/linux/misc/jenkins_java_deserialize.rb
index 3ed162368f..2b788a66d1 100644
--- a/modules/exploits/linux/misc/jenkins_java_deserialize.rb
+++ b/modules/exploits/linux/misc/jenkins_java_deserialize.rb
@@ -265,5 +265,4 @@ class MetasploitModule < Msf::Exploit::Remote
data
end
-
end
diff --git a/modules/exploits/linux/misc/lprng_format_string.rb b/modules/exploits/linux/misc/lprng_format_string.rb
index 7f04fb7ce6..584abe14cf 100644
--- a/modules/exploits/linux/misc/lprng_format_string.rb
+++ b/modules/exploits/linux/misc/lprng_format_string.rb
@@ -162,7 +162,6 @@ class MetasploitModule < Msf::Exploit::Remote
disconnect
end
-
end
diff --git a/modules/exploits/linux/misc/nagios_nrpe_arguments.rb b/modules/exploits/linux/misc/nagios_nrpe_arguments.rb
index 3e1ad29c11..04b05b52c2 100644
--- a/modules/exploits/linux/misc/nagios_nrpe_arguments.rb
+++ b/modules/exploits/linux/misc/nagios_nrpe_arguments.rb
@@ -182,5 +182,4 @@ class MetasploitModule < Msf::Exploit::Remote
@ssl_socket.sysclose if datastore['NRPESSL'] or @force_ssl
super
end
-
end
diff --git a/modules/exploits/linux/misc/novell_edirectory_ncp_bof.rb b/modules/exploits/linux/misc/novell_edirectory_ncp_bof.rb
index 55853a891f..24c948d9fc 100644
--- a/modules/exploits/linux/misc/novell_edirectory_ncp_bof.rb
+++ b/modules/exploits/linux/misc/novell_edirectory_ncp_bof.rb
@@ -125,5 +125,4 @@ class MetasploitModule < Msf::Exploit::Remote
sock.get_once(-1, 10)
disconnect
end
-
end
diff --git a/modules/exploits/linux/misc/sercomm_exec.rb b/modules/exploits/linux/misc/sercomm_exec.rb
index cb26ce95f0..c6355b4b65 100644
--- a/modules/exploits/linux/misc/sercomm_exec.rb
+++ b/modules/exploits/linux/misc/sercomm_exec.rb
@@ -208,5 +208,4 @@ class MetasploitModule < Msf::Exploit::Remote
Rex.sleep(1)
end
-
end
diff --git a/modules/exploits/linux/misc/zabbix_server_exec.rb b/modules/exploits/linux/misc/zabbix_server_exec.rb
index 79ada49ae8..a9de3f8f6e 100644
--- a/modules/exploits/linux/misc/zabbix_server_exec.rb
+++ b/modules/exploits/linux/misc/zabbix_server_exec.rb
@@ -138,5 +138,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
-
end
diff --git a/modules/exploits/linux/mysql/mysql_yassl_getname.rb b/modules/exploits/linux/mysql/mysql_yassl_getname.rb
index a8bb0dcbf3..baa230d45b 100644
--- a/modules/exploits/linux/mysql/mysql_yassl_getname.rb
+++ b/modules/exploits/linux/mysql/mysql_yassl_getname.rb
@@ -182,5 +182,4 @@ class MetasploitModule < Msf::Exploit::Remote
tre = len & 0xff
[uno,dos,tre].pack('C*')
end
-
end
diff --git a/modules/exploits/linux/mysql/mysql_yassl_hello.rb b/modules/exploits/linux/mysql/mysql_yassl_hello.rb
index 9234bdcbd8..af4769dd65 100644
--- a/modules/exploits/linux/mysql/mysql_yassl_hello.rb
+++ b/modules/exploits/linux/mysql/mysql_yassl_hello.rb
@@ -69,5 +69,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
disconnect
end
-
end
diff --git a/modules/exploits/linux/pop3/cyrus_pop3d_popsubfolders.rb b/modules/exploits/linux/pop3/cyrus_pop3d_popsubfolders.rb
index 92773bce59..8a4173d25d 100644
--- a/modules/exploits/linux/pop3/cyrus_pop3d_popsubfolders.rb
+++ b/modules/exploits/linux/pop3/cyrus_pop3d_popsubfolders.rb
@@ -87,5 +87,4 @@ class MetasploitModule < Msf::Exploit::Remote
disconnect
end
-
end
diff --git a/modules/exploits/linux/pptp/poptop_negative_read.rb b/modules/exploits/linux/pptp/poptop_negative_read.rb
index da74b784c4..0e658e1073 100644
--- a/modules/exploits/linux/pptp/poptop_negative_read.rb
+++ b/modules/exploits/linux/pptp/poptop_negative_read.rb
@@ -121,5 +121,4 @@ class MetasploitModule < Msf::Exploit::Remote
handler
disconnect
end
-
end
diff --git a/modules/exploits/linux/proxy/squid_ntlm_authenticate.rb b/modules/exploits/linux/proxy/squid_ntlm_authenticate.rb
index 8323da77e3..2eb5ff30a4 100644
--- a/modules/exploits/linux/proxy/squid_ntlm_authenticate.rb
+++ b/modules/exploits/linux/proxy/squid_ntlm_authenticate.rb
@@ -127,5 +127,4 @@ class MetasploitModule < Msf::Exploit::Remote
"\r\n"
sock.put(req)
end
-
end
diff --git a/modules/exploits/linux/samba/chain_reply.rb b/modules/exploits/linux/samba/chain_reply.rb
index 680dd16f14..eebe034289 100644
--- a/modules/exploits/linux/samba/chain_reply.rb
+++ b/modules/exploits/linux/samba/chain_reply.rb
@@ -208,5 +208,4 @@ class MetasploitModule < Msf::Exploit::Remote
break if session_created?
}
end
-
end
diff --git a/modules/exploits/linux/samba/is_known_pipename.rb b/modules/exploits/linux/samba/is_known_pipename.rb
index a490b277a9..f1d93ce4a3 100644
--- a/modules/exploits/linux/samba/is_known_pipename.rb
+++ b/modules/exploits/linux/samba/is_known_pipename.rb
@@ -468,5 +468,4 @@ class MetasploitModule < Msf::Exploit::Remote
print_good("Samba version #{samba_version.to_s} found with writeable share '#{@share}'")
return CheckCode::Appears
end
-
end
diff --git a/modules/exploits/linux/samba/lsa_transnames_heap.rb b/modules/exploits/linux/samba/lsa_transnames_heap.rb
index 9e73d3e836..3431c66258 100644
--- a/modules/exploits/linux/samba/lsa_transnames_heap.rb
+++ b/modules/exploits/linux/samba/lsa_transnames_heap.rb
@@ -341,5 +341,4 @@ class MetasploitModule < Msf::Exploit::Remote
dcerpc.last_response.stub_data[0,20]
end
-
end
diff --git a/modules/exploits/linux/samba/setinfopolicy_heap.rb b/modules/exploits/linux/samba/setinfopolicy_heap.rb
index 5c159a9b31..534c3f7b40 100644
--- a/modules/exploits/linux/samba/setinfopolicy_heap.rb
+++ b/modules/exploits/linux/samba/setinfopolicy_heap.rb
@@ -384,6 +384,5 @@ class MetasploitModule < Msf::Exploit::Remote
dcerpc.socket.write(data)
data.length
end
-
end
diff --git a/modules/exploits/linux/samba/trans2open.rb b/modules/exploits/linux/samba/trans2open.rb
index 2d9a7cd69e..88978de114 100644
--- a/modules/exploits/linux/samba/trans2open.rb
+++ b/modules/exploits/linux/samba/trans2open.rb
@@ -150,5 +150,4 @@ class MetasploitModule < Msf::Exploit::Remote
disconnect
end
-
end
diff --git a/modules/exploits/linux/smtp/exim4_dovecot_exec.rb b/modules/exploits/linux/smtp/exim4_dovecot_exec.rb
index 9b512bfb34..8c82d3044f 100644
--- a/modules/exploits/linux/smtp/exim4_dovecot_exec.rb
+++ b/modules/exploits/linux/smtp/exim4_dovecot_exec.rb
@@ -215,5 +215,4 @@ class MetasploitModule < Msf::Exploit::Remote
register_file_for_cleanup("/tmp/#{filename}")
end
-
end
diff --git a/modules/exploits/linux/ssh/exagrid_known_privkey.rb b/modules/exploits/linux/ssh/exagrid_known_privkey.rb
index c9e1433f95..f4728464cb 100644
--- a/modules/exploits/linux/ssh/exagrid_known_privkey.rb
+++ b/modules/exploits/linux/ssh/exagrid_known_privkey.rb
@@ -190,5 +190,4 @@ x6f/85mMeTqamSxjTJqALHeKPYWyzeSnUrp+Eg==
-----END RSA PRIVATE KEY-----
EOF
end
-
end
diff --git a/modules/exploits/linux/ssh/loadbalancerorg_enterprise_known_privkey.rb b/modules/exploits/linux/ssh/loadbalancerorg_enterprise_known_privkey.rb
index 34284c4dfb..b4d011e27d 100644
--- a/modules/exploits/linux/ssh/loadbalancerorg_enterprise_known_privkey.rb
+++ b/modules/exploits/linux/ssh/loadbalancerorg_enterprise_known_privkey.rb
@@ -136,7 +136,6 @@ SzmJVCWFyVuuANR2Bnc=
-----END DSA PRIVATE KEY-----
EOF
end
-
end
diff --git a/modules/exploits/linux/ssh/solarwinds_lem_exec.rb b/modules/exploits/linux/ssh/solarwinds_lem_exec.rb
index d7fdcde644..7f10296cb5 100644
--- a/modules/exploits/linux/ssh/solarwinds_lem_exec.rb
+++ b/modules/exploits/linux/ssh/solarwinds_lem_exec.rb
@@ -164,5 +164,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
end
-
end
diff --git a/modules/exploits/linux/ssh/ubiquiti_airos_file_upload.rb b/modules/exploits/linux/ssh/ubiquiti_airos_file_upload.rb
index de9b7d3d40..28b5a89155 100644
--- a/modules/exploits/linux/ssh/ubiquiti_airos_file_upload.rb
+++ b/modules/exploits/linux/ssh/ubiquiti_airos_file_upload.rb
@@ -249,5 +249,4 @@ cp /etc/persistent/#{username}/passwd /etc/passwd
cp /etc/persistent/#{username}/authorized_keys /etc/dropbear/authorized_keys
EOF
end
-
end
diff --git a/modules/exploits/linux/telnet/telnet_encrypt_keyid.rb b/modules/exploits/linux/telnet/telnet_encrypt_keyid.rb
index de8b867c0c..4b7041b8bc 100644
--- a/modules/exploits/linux/telnet/telnet_encrypt_keyid.rb
+++ b/modules/exploits/linux/telnet/telnet_encrypt_keyid.rb
@@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Remote
::IO.select(nil, nil, nil, 0.5)
disconnect
end
-
end
diff --git a/modules/exploits/linux/upnp/miniupnpd_soap_bof.rb b/modules/exploits/linux/upnp/miniupnpd_soap_bof.rb
index dd682d141b..fc877889af 100644
--- a/modules/exploits/linux/upnp/miniupnpd_soap_bof.rb
+++ b/modules/exploits/linux/upnp/miniupnpd_soap_bof.rb
@@ -219,5 +219,4 @@ class MetasploitModule < Msf::Exploit::Remote
'data' => data
})
end
-
end
diff --git a/modules/exploits/multi/browser/adobe_flash_pixel_bender_bof.rb b/modules/exploits/multi/browser/adobe_flash_pixel_bender_bof.rb
index baaf02f5a9..b63ecc0c85 100644
--- a/modules/exploits/multi/browser/adobe_flash_pixel_bender_bof.rb
+++ b/modules/exploits/multi/browser/adobe_flash_pixel_bender_bof.rb
@@ -144,5 +144,4 @@ class MetasploitModule < Msf::Exploit::Remote
swf
end
-
end
diff --git a/modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb b/modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb
index 7a8c634768..b05f300114 100644
--- a/modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb
+++ b/modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb
@@ -142,5 +142,4 @@ class MetasploitModule < Msf::Exploit::Remote
swf
end
-
end
diff --git a/modules/exploits/multi/browser/firefox_escape_retval.rb b/modules/exploits/multi/browser/firefox_escape_retval.rb
index 3faaefea0b..32d0650bd1 100644
--- a/modules/exploits/multi/browser/firefox_escape_retval.rb
+++ b/modules/exploits/multi/browser/firefox_escape_retval.rb
@@ -218,5 +218,4 @@ EOF
^
end
-
end
diff --git a/modules/exploits/multi/browser/firefox_queryinterface.rb b/modules/exploits/multi/browser/firefox_queryinterface.rb
index 13d975858d..634430fb8a 100644
--- a/modules/exploits/multi/browser/firefox_queryinterface.rb
+++ b/modules/exploits/multi/browser/firefox_queryinterface.rb
@@ -108,5 +108,4 @@ function FillHeap() {