Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 6211915

Browse files
committed
Cosmetic fix
1 parent cfa5655 commit 6211915

3 files changed

Lines changed: 4 additions & 4 deletions

File tree

lib/controller/controller.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@
3232
from lib.core.session import setInjection
3333
from lib.core.target import initTargetEnv
3434
from lib.core.target import setupTargetEnv
35-
from lib.core.target import __findPageForms
35+
from lib.core.target import findPageForms
3636
from lib.utils.parenthesis import checkForParenthesis
3737

3838
def __selectInjection(injData):
@@ -93,7 +93,7 @@ def start():
9393

9494
if conf.url:
9595
if conf.forms:
96-
__findPageForms()
96+
findPageForms()
9797
else:
9898
kb.targetUrls.add(( conf.url, conf.method, conf.data, conf.cookie ))
9999

lib/core/target.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ def __setRequestParams():
121121
errMsg += "within the GET, POST and Cookie parameters"
122122
raise sqlmapGenericException, errMsg
123123

124-
def __findPageForms():
124+
def findPageForms():
125125
infoMsg = "searching for forms"
126126
logger.info(infoMsg)
127127

lib/parse/cmdline.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ def cmdLineParser():
198198
help="Compare pages based only on their textual content")
199199

200200
injection.add_option("--tamper", dest="tamper",
201-
help="Use given module(s) for tampering injection data")
201+
help="Use given script(s) for tampering injection data")
202202

203203
# Techniques options
204204
techniques = OptionGroup(parser, "Techniques", "These options can "

0 commit comments

Comments
 (0)