Skip to content

Commit b30e073

Browse files
committed
minor updates
1 parent cd9d420 commit b30e073

File tree

3 files changed

+7
-5
lines changed

3 files changed

+7
-5
lines changed

README.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,9 @@ This tool is really helpful if you're doing IT security or if you want to scan y
1212

1313
# Features
1414

15+
CredSLayer doesn't waste your time with invalid credentials, it makes sure credentials are valid.
16+
Yet if it's not able to tell whether they're valid or not, what has been found will be printed out anyway.
17+
1518
Right now, CredSLayer supports the following protocols:
1619
* FTP
1720
* SMTP / IMAP / POP3

credslayer/parsers/__init__.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
# coding: utf-8
22

33
"""
4-
Each parser within the `credslayer.parsers` module will extract credentials of corresponding protocols.
5-
If tshark identifies a packet to be part of the FTP, CredSLayer will automatically dispatch its analysis to
6-
the ftp.py parser.
4+
Each parser within the ``credslayer.parsers`` module will extract credentials of corresponding protocols.
5+
For example if tshark identifies a packet to be part of the FTP, CredSLayer will automatically dispatch its analysis to
6+
the ``ftp.py`` parser.
77
"""
88

99
import os

tests/tests.py

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -200,8 +200,7 @@ def test_malformed(self):
200200
def test_protocol_decode_as(self):
201201
from credslayer.core import manager
202202
credentials_list = manager.process_pcap("samples/telnet-hidden.pcap",
203-
decode_as={"tcp.port==1337": "telnet"})\
204-
.get_list_of_all_credentials()
203+
decode_as={"tcp.port==1337": "telnet"}).get_list_of_all_credentials()
205204
print(credentials_list)
206205
self.assertTrue(Credentials("shellcode", "shellcode") in credentials_list)
207206

0 commit comments

Comments
 (0)