diff --git a/scripts/bitcoin-getaddr.nse b/scripts/bitcoin-getaddr.nse index abfe45e8e..1403f52bd 100644 --- a/scripts/bitcoin-getaddr.nse +++ b/scripts/bitcoin-getaddr.nse @@ -22,9 +22,10 @@ license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} require 'shortport' -require 'bitcoin' require 'tab' require 'target' +require 'stdnse' +stdnse.silent_require('bitcoin') -- -- Version 0.1 diff --git a/scripts/bittorrent-discovery.nse b/scripts/bittorrent-discovery.nse index 4b223f640..32e67adc4 100644 --- a/scripts/bittorrent-discovery.nse +++ b/scripts/bittorrent-discovery.nse @@ -39,9 +39,9 @@ author = "Gorjan Petrovski" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"discovery","safe"} -require "bittorrent" -require "stdnse" require "target" +require 'stdnse' +stdnse.silent_require('bittorrent') prerule = function() if not stdnse.get_script_args(SCRIPT_NAME..".torrent") and diff --git a/scripts/broadcast-ping.nse b/scripts/broadcast-ping.nse index f1a552c91..23ae2eb6c 100644 --- a/scripts/broadcast-ping.nse +++ b/scripts/broadcast-ping.nse @@ -49,10 +49,10 @@ categories = {"discovery","safe","broadcast"} require "nmap" require "stdnse" require "packet" -require "openssl" require "bin" require "tab" require "target" +stdnse.silent_require("openssl") prerule = function() if not nmap.is_privileged() then diff --git a/scripts/http-vuln-cve2010-2861.nse b/scripts/http-vuln-cve2010-2861.nse index 72529a1d7..51386cde6 100644 --- a/scripts/http-vuln-cve2010-2861.nse +++ b/scripts/http-vuln-cve2010-2861.nse @@ -49,7 +49,8 @@ require("http") require("shortport") require("tab") require("vulns") -require("openssl") +require("stdnse") +stdnse.silent_require("openssl") portrule = shortport.http @@ -132,4 +133,4 @@ locale parameter]], end vuln.extra_info=stdnse.format_output(true, results) return vuln_report:make_output(vuln) -end \ No newline at end of file +end diff --git a/scripts/ipv6-node-info.nse b/scripts/ipv6-node-info.nse index 8b7f69542..5a800b2c0 100644 --- a/scripts/ipv6-node-info.nse +++ b/scripts/ipv6-node-info.nse @@ -29,8 +29,9 @@ author = "David Fifield" require("bin") require("bit") require("dns") -require("openssl") +require("stdnse") require("packet") +stdnse.silent_require("openssl") local ICMPv6_NODEINFOQUERY = 139 local ICMPv6_NODEINFOQUERY_IPv6ADDR = 0 diff --git a/scripts/lltd-discovery.nse b/scripts/lltd-discovery.nse index a6dced0c4..49e13941e 100644 --- a/scripts/lltd-discovery.nse +++ b/scripts/lltd-discovery.nse @@ -26,7 +26,8 @@ require "bin" require "stdnse" require "target" require "nmap" -require "openssl" +require "stdnse" +stdnse.silent_require("openssl") prerule = function() if not nmap.is_privileged() then diff --git a/scripts/mongodb-brute.nse b/scripts/mongodb-brute.nse index 837c82cfe..3fea0ef84 100644 --- a/scripts/mongodb-brute.nse +++ b/scripts/mongodb-brute.nse @@ -17,8 +17,9 @@ Performs brute force password auditing against the MongoDB database. -- require 'brute' -require 'mongodb' require 'shortport' +require 'stdnse' +stdnse.silent_require('mongodb') author = "Patrik Karlsson" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" diff --git a/scripts/mongodb-databases.nse b/scripts/mongodb-databases.nse index 4c354cd00..8ef1f66bb 100644 --- a/scripts/mongodb-databases.nse +++ b/scripts/mongodb-databases.nse @@ -40,8 +40,9 @@ categories = {"default", "discovery", "safe"} dependencies = {"mongodb-brute"} require "creds" -require "mongodb" require "shortport" +require 'stdnse' +stdnse.silent_require('mongodb') portrule = shortport.port_or_service({27017}, {"mongodb"}) diff --git a/scripts/mongodb-info.nse b/scripts/mongodb-info.nse index b0001bb7e..9bafc9530 100644 --- a/scripts/mongodb-info.nse +++ b/scripts/mongodb-info.nse @@ -53,8 +53,9 @@ categories = {"default", "discovery", "safe"} dependencies = {"mongodb-brute"} require "creds" -require "mongodb" require "shortport" +require 'stdnse' +stdnse.silent_require('mongodb') local arg_db = stdnse.get_script_args(SCRIPT_NAME .. ".db") or "admin" diff --git a/scripts/rsync-brute.nse b/scripts/rsync-brute.nse index fdc000ebc..c1bb2e5eb 100644 --- a/scripts/rsync-brute.nse +++ b/scripts/rsync-brute.nse @@ -21,7 +21,8 @@ Performs brute force password auditing against the rsync remote file syncing pro require 'shortport' require 'brute' -require 'rsync' +require 'stdnse' +stdnse.silent_require('rsync') author = "Patrik Karlsson" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" diff --git a/scripts/vuze-dht-info.nse b/scripts/vuze-dht-info.nse index e97edd86c..98f464558 100644 --- a/scripts/vuze-dht-info.nse +++ b/scripts/vuze-dht-info.nse @@ -34,7 +34,8 @@ categories = {"discovery", "safe"} require 'shortport' require 'ipOps' -require 'vuzedht' +require 'stdnse' +stdnse.silent_require('vuzedht') portrule = function(host, port) local allports = stdnse.get_script_args('vuze-dht-info.allports') @@ -79,4 +80,4 @@ action = function(host, port) nmap.set_port_state(host, port, "open") return tostring(response) end -end \ No newline at end of file +end