Skip to content

Commit 5b77b20

Browse files
committed
Removing trailing whitespaces (PEP8)
1 parent 82b4682 commit 5b77b20

File tree

9 files changed

+23
-23
lines changed

9 files changed

+23
-23
lines changed

lib/controller/controller.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -365,7 +365,7 @@ def start():
365365
# a warning message to the user in case the page is not stable
366366
checkStability()
367367

368-
# Do a little prioritization reorder of a testable parameter list
368+
# Do a little prioritization reorder of a testable parameter list
369369
parameters = conf.parameters.keys()
370370

371371
# Order of testing list (last to first)

lib/core/enums.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ class SORT_ORDER:
2424

2525
class DBMS:
2626
ACCESS = "Microsoft Access"
27-
DB2 = "IBM DB2"
27+
DB2 = "IBM DB2"
2828
FIREBIRD = "Firebird"
2929
MAXDB = "SAP MaxDB"
3030
MSSQL = "Microsoft SQL Server"

lib/core/subprocessng.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ def blockingReadFromFD(fd):
3434
# Uncomment the following line if the process seems to
3535
# take a huge amount of cpu time
3636
# time.sleep(0.01)
37-
continue
37+
continue
3838
else:
3939
raise
4040
break
@@ -52,9 +52,9 @@ def blockingWriteToFD(fd, data):
5252
wrote_data = os.write(fd, data)
5353
except (OSError, IOError), io:
5454
if io.errno in (errno.EAGAIN, errno.EINTR):
55-
continue
55+
continue
5656
else:
57-
raise
57+
raise
5858

5959
if wrote_data < data_length:
6060
blockingWriteToFD(fd, data[wrote_data:])

lib/request/rangehandler.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ class HTTPRangeHandler(urllib2.BaseHandler):
1717
Reference: http://stackoverflow.com/questions/1971240/python-seek-on-remote-file
1818
1919
This was extremely simple. The Range header is a HTTP feature to
20-
begin with so all this class does is tell urllib2 that the
21-
"206 Partial Content" response from the HTTP server is what we
20+
begin with so all this class does is tell urllib2 that the
21+
"206 Partial Content" response from the HTTP server is what we
2222
expected.
2323
2424
Example:

plugins/dbms/db2/enumeration.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111

1212
class Enumeration(GenericEnumeration):
1313
def __init__(self):
14-
GenericEnumeration.__init__(self)
14+
GenericEnumeration.__init__(self)
1515

1616
def getPasswordHashes(self):
1717
warnMsg = "on DB2 it is not possible to list password hashes"

plugins/dbms/mssqlserver/filesystem.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -261,22 +261,22 @@ def _stackedWriteFileVbs(self, tmpPath, wFileContent, dFile, fileType):
261261
Set file = fs.GetFile(inputFilePath)
262262
If file.Size Then
263263
Wscript.Echo "Loading from: " & inputFilePath
264-
Wscript.Echo
264+
Wscript.Echo
265265
Set fd = fs.OpenTextFile(inputFilePath, 1)
266266
data = fd.ReadAll
267267
fd.Close
268268
data = Replace(data, " ", "")
269269
data = Replace(data, vbCr, "")
270270
data = Replace(data, vbLf, "")
271-
Wscript.Echo "Fixed Input: "
271+
Wscript.Echo "Fixed Input: "
272272
Wscript.Echo data
273-
Wscript.Echo
273+
Wscript.Echo
274274
decodedData = base64_decode(data)
275-
Wscript.Echo "Output: "
275+
Wscript.Echo "Output: "
276276
Wscript.Echo decodedData
277-
Wscript.Echo
277+
Wscript.Echo
278278
Wscript.Echo "Writing output in: " & outputFilePath
279-
Wscript.Echo
279+
Wscript.Echo
280280
Set ofs = CreateObject("Scripting.FileSystemObject").OpenTextFile(outputFilePath, 2, True)
281281
ofs.Write decodedData
282282
ofs.close

tamper/multiplespaces.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ def tamper(payload, **kwargs):
2222
2323
Example:
2424
* Input: UNION SELECT
25-
* Output: UNION SELECT
25+
* Output: UNION SELECT
2626
2727
Notes:
2828
* Useful to bypass very weak and bespoke web application firewalls

tamper/space2morehash.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ def process(match):
5151
else:
5252
return match.group()
5353

54-
retVal = ""
54+
retVal = ""
5555

5656
if payload:
5757
payload = re.sub(r"(?<=\W)(?P<word>[A-Za-z_]+)(?=\W|\Z)", lambda match: process(match), payload)

tamper/space2mssqlblank.py

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -42,16 +42,16 @@ def tamper(payload, **kwargs):
4242
# STX 02 start of text
4343
# ETX 03 end of text
4444
# EOT 04 end of transmission
45-
# ENQ 05 enquiry
46-
# ACK 06 acknowledge
45+
# ENQ 05 enquiry
46+
# ACK 06 acknowledge
4747
# BEL 07 bell
4848
# BS 08 backspace
4949
# TAB 09 horizontal tab
5050
# LF 0A new line
51-
# VT 0B vertical TAB
52-
# FF 0C new page
53-
# CR 0D carriage return
54-
# SO 0E shift out
51+
# VT 0B vertical TAB
52+
# FF 0C new page
53+
# CR 0D carriage return
54+
# SO 0E shift out
5555
# SI 0F shift in
5656
blanks = ('%01', '%02', '%03', '%04', '%05', '%06', '%07', '%08', '%09', '%0B', '%0C', '%0D', '%0E', '%0F', '%0A')
5757
retVal = payload
@@ -82,7 +82,7 @@ def tamper(payload, **kwargs):
8282
else:
8383
retVal += random.choice(blanks)
8484

85-
continue
85+
continue
8686

8787
retVal += payload[i]
8888

0 commit comments

Comments
 (0)