Skip to content

Commit

Permalink
Authors cleanup
Browse files Browse the repository at this point in the history
  • Loading branch information
RageLtMan committed Dec 29, 2021
1 parent 4f8448c commit 5eb2c32
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 5 deletions.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
package metasploit;
import java.util.Hashtable;
import javax.naming.*;

// by mihi (Michael Schierl)/@schierlm
public class PayloadFactory implements javax.naming.spi.ObjectFactory {
// Required method override to be a valid Factory
public Object getObjectInstance(Object obj, Name name, Context nameCtx, Hashtable<?, ?> environment) throws Exception {
Expand Down
8 changes: 4 additions & 4 deletions modules/exploits/multi/http/log4shell_header_injection.rb
Original file line number Diff line number Diff line change
Expand Up @@ -16,11 +16,11 @@ def initialize
and execute attacker controlled data.
},
'Author' => [
'Michael Schierl', # All of the Jedi stuff
'juan vazquez', # 2011-3544 code shamelessly stolen for this module
'sinn3r', # 2011-3544 code shamelessly stolen for this module
'Michael Schierl', # Technical guidance, examples, and patience - all of the Jedi stuff
'juan vazquez', # 2011-3544 building blocks reused in this module
'sinn3r', # 2011-3544 building blocks reused in this module
'Spencer McIntyre', # HTTP scanner module for 2021-44228 and moral support
'RageLtMan <rageltman[at]sempervictus>' # Flippper-fisting of keyboard for some infra
'RageLtMan <rageltman[at]sempervictus>' # Metasploit module and infrastructure
],
'References' => [
[ 'CVE', '2021-44228' ],
Expand Down

0 comments on commit 5eb2c32

Please sign in to comment.