fixes in indent spacing

This commit is contained in:
TrustedSec 2016-06-27 10:35:44 -04:00
parent 591d57cdcf
commit 0a1fbca2c3

View file

@ -78,9 +78,9 @@ payloadgen = "regular"
if os.path.isfile(setdir + "/payloadgen"): if os.path.isfile(setdir + "/payloadgen"):
payloadgen = "solo" payloadgen = "solo"
########################################################################## #
# grab ipaddr if it hasn't been identified yet # grab ipaddr if it hasn't been identified yet
########################################################################## #
if check_options("IPADDR=") == False: if check_options("IPADDR=") == False:
fileopen = open("/etc/setoolkit/set.config", "r") fileopen = open("/etc/setoolkit/set.config", "r")
@ -136,9 +136,9 @@ try:
# if we don't trigger on the standard core api call # if we don't trigger on the standard core api call
if choice1 == "": if choice1 == "":
################################################### #
# USER INPUT: SHOW PAYLOAD MENU 1 # # USER INPUT: SHOW PAYLOAD MENU 1 #
################################################### #
debug_msg(me, "printing 'text.payload_menu_1'", 5) debug_msg(me, "printing 'text.payload_menu_1'", 5)
show_payload_menu1 = create_menu(payload_menu_1_text, payload_menu_1) show_payload_menu1 = create_menu(payload_menu_1_text, payload_menu_1)
choice1 = raw_input(setprompt(["4"], "")) choice1 = raw_input(setprompt(["4"], ""))
@ -311,7 +311,8 @@ try:
# if we are using shellcodeexec # if we are using shellcodeexec
if choice1 == "shellcode/alphanum" or choice1 == "shellcode/pyinject" or choice1 == "shellcode/multipyinject": if choice1 == "shellcode/alphanum" or choice1 == "shellcode/pyinject" or choice1 == "shellcode/multipyinject":
if choice1 == "shellcode/alphanum" or choice1 == "shellcode/pyinject": if choice1 == "shellcode/alphanum" or choice1 == "shellcode/pyinject":
print ("\nSelect the payload you want to deliver via shellcode injection\n\n 1) Windows Meterpreter Reverse TCP\n 2) Windows Meterpreter (Reflective Injection), Reverse HTTPS Stager\n 3) Windows Meterpreter (Reflective Injection) Reverse HTTP Stager\n 4) Windows Meterpreter (ALL PORTS) Reverse TCP\n") print (
"\nSelect the payload you want to deliver via shellcode injection\n\n 1) Windows Meterpreter Reverse TCP\n 2) Windows Meterpreter (Reflective Injection), Reverse HTTPS Stager\n 3) Windows Meterpreter (Reflective Injection) Reverse HTTP Stager\n 4) Windows Meterpreter (ALL PORTS) Reverse TCP\n")
# select payload # select payload
choice9 = raw_input( choice9 = raw_input(
setprompt(["4"], "Enter the number for the payload [meterpreter_reverse_https]")) setprompt(["4"], "Enter the number for the payload [meterpreter_reverse_https]"))
@ -361,7 +362,8 @@ try:
while 1: while 1:
if choice1 == "shellcode/multipyinject": if choice1 == "shellcode/multipyinject":
print ("\nSelect the payload you want to deliver via shellcode injection\n\n 1) Windows Meterpreter Reverse TCP\n 2) Windows Meterpreter (Reflective Injection), Reverse HTTPS Stager\n 3) Windows Meterpreter (Reflective Injection) Reverse HTTP Stager\n 4) Windows Meterpreter (ALL PORTS) Reverse TCP\n 5) Windows Reverse Command Shell\n 6) I'm finished adding payloads.\n") print (
"\nSelect the payload you want to deliver via shellcode injection\n\n 1) Windows Meterpreter Reverse TCP\n 2) Windows Meterpreter (Reflective Injection), Reverse HTTPS Stager\n 3) Windows Meterpreter (Reflective Injection) Reverse HTTP Stager\n 4) Windows Meterpreter (ALL PORTS) Reverse TCP\n 5) Windows Reverse Command Shell\n 6) I'm finished adding payloads.\n")
choice9 = raw_input( choice9 = raw_input(
setprompt(["4"], "Enter the number for the payload [meterpreter_reverse_tcp]")) setprompt(["4"], "Enter the number for the payload [meterpreter_reverse_tcp]"))
# select default meterpreter reverse tcp # select default meterpreter reverse tcp