data/websploit-4.0.4/websploit/core/utils/fake_mac:9: BA ==> BY, BE data/websploit-4.0.4/websploit/core/utils/fake_mac:36: BA ==> BY, BE data/websploit-4.0.4/websploit/core/utils/fake_mac:113: BA ==> BY, BE data/websploit-4.0.4/websploit/core/utils/fake_mac:174: BA ==> BY, BE data/websploit-4.0.4/websploit/core/utils/startup.py:7: befor ==> before data/websploit-4.0.4/websploit/core/utils/tools.py:7: ans ==> and data/websploit-4.0.4/websploit/core/utils/tools.py:7: Ether ==> Either data/websploit-4.0.4/websploit/core/utils/tools.py:8: ans ==> and data/websploit-4.0.4/websploit/core/utils/tools.py:9: ans ==> and data/websploit-4.0.4/websploit/modules/arp_spoof.py:47: Stoping ==> Stopping data/websploit-4.0.4/websploit/modules/scan_network.py:19: ether ==> either data/websploit-4.0.4/websploit/modules/scan_network.py:19: Ether ==> Either data/websploit-4.0.4/websploit/modules/scan_network.py:21: ether ==> either data/websploit-4.0.4/websploit/modules/wifi_fap.py:31: Managment ==> Management data/websploit-4.0.4/websploit/modules/wifi_fap_spam.py:60: Managment ==> Management data/websploit-4.0.4/debian/changelog:10: Swith ==> Switch data/websploit-4.0.4/debian/changelog:65: Asign ==> Assign data/websploit-4.0.4/debian/control:19: vulnerabilites ==> vulnerabilities