data/websploit-4.0.4/websploit/core/utils/fake_mac:9: BA ==> BY, BE
data/websploit-4.0.4/websploit/core/utils/fake_mac:36: BA ==> BY, BE
data/websploit-4.0.4/websploit/core/utils/fake_mac:113: BA ==> BY, BE
data/websploit-4.0.4/websploit/core/utils/fake_mac:174: BA ==> BY, BE
data/websploit-4.0.4/websploit/core/utils/startup.py:7: befor ==> before
data/websploit-4.0.4/websploit/core/utils/tools.py:7: ans ==> and
data/websploit-4.0.4/websploit/core/utils/tools.py:7: Ether ==> Either
data/websploit-4.0.4/websploit/core/utils/tools.py:8: ans ==> and
data/websploit-4.0.4/websploit/core/utils/tools.py:9: ans ==> and
data/websploit-4.0.4/websploit/modules/arp_spoof.py:47: Stoping ==> Stopping
data/websploit-4.0.4/websploit/modules/scan_network.py:19: ether ==> either
data/websploit-4.0.4/websploit/modules/scan_network.py:19: Ether ==> Either
data/websploit-4.0.4/websploit/modules/scan_network.py:21: ether ==> either
data/websploit-4.0.4/websploit/modules/wifi_fap.py:31: Managment ==> Management
data/websploit-4.0.4/websploit/modules/wifi_fap_spam.py:60: Managment ==> Management
data/websploit-4.0.4/debian/changelog:10: Swith ==> Switch
data/websploit-4.0.4/debian/changelog:65: Asign ==> Assign
data/websploit-4.0.4/debian/control:19: vulnerabilites ==> vulnerabilities