Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit ccd6fb7

Browse files
committed
minor refactoring
1 parent 965c151 commit ccd6fb7

6 files changed

Lines changed: 7 additions & 32 deletions

File tree

tamper/apostrophemask.py

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,4 @@ def tamper(payload):
2929
* http://lukasz.pilorz.net/testy/full_width_utf/index.phps
3030
"""
3131

32-
retVal = payload
33-
34-
if payload:
35-
retVal = payload.replace('\'', '%EF%BC%87')
36-
37-
return retVal
32+
return payload.replace('\'', '%EF%BC%87') if payload else payload

tamper/apostrophenullencode.py

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,4 @@ def tamper(payload):
2323
* Output: AND %00%271%00%27=%00%271%00%27
2424
"""
2525

26-
retVal = payload
27-
28-
if payload:
29-
retVal = payload.replace('\'', '%00%27')
30-
31-
return retVal
26+
return payload.replace('\'', '%00%27') if payload else payload

tamper/appendnullbyte.py

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,4 @@ def tamper(payload):
3333
Reference: http://projects.webappsec.org/w/page/13246949/Null-Byte-Injection
3434
"""
3535

36-
retVal = payload
37-
38-
if payload:
39-
retVal = "%s%%00" % payload
40-
41-
return retVal
36+
return "%s%%00" % payload if payload else payload

tamper/base64encode.py

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,4 @@ def tamper(payload):
2525
* Output: MScgQU5EIFNMRUVQKDUpIw==
2626
"""
2727

28-
retVal = payload
29-
30-
if payload:
31-
retVal = base64.b64encode(payload)
32-
33-
return retVal
28+
return base64.b64encode(payload) if payload else payload

tamper/securesphere.py

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,4 @@ def tamper(payload):
2929
* Reference: http://seclists.org/fulldisclosure/2011/May/163
3030
"""
3131

32-
retVal = payload
33-
34-
if payload:
35-
retVal += " and '0having'='0having'"
36-
37-
return retVal
32+
return payload + " and '0having'='0having'" if payload else payload

tamper/space2randomblank.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ def tamper(payload):
4040
# LF 0A new line
4141
# FF 0C new page
4242
# CR 0D carriage return
43-
blanks = ['%09', '%0A', '%0C', '%0D']
43+
blanks = ("%09", "%0A", "%0C", "%0D")
4444
retVal = payload
4545

4646
if payload:
@@ -60,7 +60,7 @@ def tamper(payload):
6060
elif payload[i] == '"':
6161
doublequote = not doublequote
6262

63-
elif payload[i] == " " and not doublequote and not quote:
63+
elif payload[i] == ' ' and not doublequote and not quote:
6464
retVal += random.choice(blanks)
6565
continue
6666

0 commit comments

Comments
 (0)