summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2023-06-20 07:01:06 +0000
committerCoprDistGit <infra@openeuler.org>2023-06-20 07:01:06 +0000
commit9be373b1d90962c4084c8d69de5a8f12cc2da190 (patch)
treef8bf49d03cc45de47d44b91257f3a43333e87722
parentf56efe419a05a67fe9c1c1bb02bd91f431a5edf3 (diff)
automatic import of python-Commi3openeuler20.03
-rw-r--r--.gitignore1
-rw-r--r--python-commi3.spec289
-rw-r--r--sources1
3 files changed, 291 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
index e69de29..258399d 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/Commi3-1.0.7.tar.gz
diff --git a/python-commi3.spec b/python-commi3.spec
new file mode 100644
index 0000000..c0bddd2
--- /dev/null
+++ b/python-commi3.spec
@@ -0,0 +1,289 @@
+%global _empty_manifest_terminate_build 0
+Name: python-Commi3
+Version: 1.0.7
+Release: 1
+Summary: Is an Automated Commando Line Tool for pentesting and other fun stuff
+License: MIT
+URL: https://github.com/VanirLab/commi3
+Source0: https://mirrors.aliyun.com/pypi/web/packages/26/40/615ba5550453a2cacd115e615d0ef796d1da575a00aea7da54f6fe7c043a/Commi3-1.0.7.tar.gz
+BuildArch: noarch
+
+Requires: python3-colorama
+Requires: python3-Jinja2
+Requires: python3-dns-lexicon
+Requires: python3-bs4
+
+%description
+<p align="center">
+ <img alt="VanirLab" src="https://github.com/VanirLab/commi3/blob/master/commi3.png" height="142" />
+ <p align="center">
+ <a href="https://api.travis-ci.org/VanirLab/commi3"><img alt="Build Status" src="https://api.travis-ci.org/VanirLab/commi3.svg?branch=master"></a>
+ <a href="https://github.com/VanirLab/commi3/releases/tag/><img alt="Version 1.0" src="https://img.shields.io/badge/Version-1.0-green.svg"></a>
+ <a href="http://www.python.org/download/"><img alt="Python 3.6-3.7" src="https://img.shields.io/badge/Python-3.6--3.7-yellow.svg"></a>
+ <a href="https://github.com/VanirLab/commi3/blob/master/readme/COPYING"><img alt="MIT License" src="https://img.shields.io/badge/License-MIT-red.svg"></a>
+ <a href="https://badge.fury.io/py/Commi3"><img src="https://badge.fury.io/py/Commi3.svg" alt="PyPI version" height="18"></a>
+ </p>
+</p>
+
+## General Information
+
+**Commi3** (short for [**c**]ryptoanalytic [**o**]ffensive [**m**]ultifunctional [**m**]icrostructure [**i**]njection [**3**] generation 3) is an Automated Commando Line Tool (ACLT)
+that can be used from web developers, penetration testers or even security researchers in order to test web-based applications
+with the view to find bugs, errors or vulnerabilities related to **[command injection](https://www.owasp.org/index.php/Command_Injection)** attacks.
+ By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or HTTP/HTTPS header.
+
+## Legal Disclaimer
+
+**With each commi3 run end users are obligated to agree** with the following prelude message:
+```
+(!) Legal disclaimer: Usage of Commi3 for attacking targets without prior mutual consent is illegal.
+It is the end user's responsibility to obey all applicable local, state and federal laws.
+Developers assume no liability and are not responsible for any misuse or damage caused by this program.
+```
+
+## Requirements
+
+**[Python](http://www.python.org/download/)** version **3.6.x** or **3.7.x** is required for running this program.
+
+## Installation
+
+Download commi3 by cloning the Git repository:
+
+ git clone https://github.com/VanirLab/commi3.git commi3
+
+Commi3 comes packaged on the **official repositories** of the following Linux distributions, so you can use the **package manager** to install it!
+
+- [ArchStrike](https://archstrike.org/)
+- [BlackArch Linux](http://blackarch.org/)
+- [BackBox](https://backbox.org/)
+- [Kali Linux](https://www.kali.org/)
+- [Parrot Security OS](https://www.parrotsec.org/)
+- [Pentoo Linux](https://www.pentoo.ch/)
+- [Weakerthan Linux](http://www.weaknetlabs.com/)
+
+Commi3 also comes **as a plugin**, on the following penetration testing frameworks:
+
+- [TrustedSec's Penetration Testers Framework (PTF)](https://github.com/trustedsec/ptf)
+- [OWASP Offensive Web Testing Framework (OWTF)](https://github.com/owtf/owtf)
+- [CTF-Tools](https://github.com/zardus/ctf-tools)
+- [PentestBox](https://tools.pentestbox.com/)
+- [PenBox](https://github.com/x3omdax/PenBox)
+- [Katoolin](https://github.com/LionSec/katoolin)
+- [Aptive's Penetration Testing tools](https://github.com/Aptive/penetration-testing-tools)
+- [Homebrew Tap - Pen Test Tools ](https://github.com/sidaf/homebrew-pentest)
+
+## Supported Platforms
+
+- Linux
+- Mac OS X
+- Windows
+
+## Usage
+
+To get a list of all options and switches use:
+
+ python commi3.py -h & python3 commi3.py -h
+
+
+
+
+%package -n python3-Commi3
+Summary: Is an Automated Commando Line Tool for pentesting and other fun stuff
+Provides: python-Commi3
+BuildRequires: python3-devel
+BuildRequires: python3-setuptools
+BuildRequires: python3-pip
+%description -n python3-Commi3
+<p align="center">
+ <img alt="VanirLab" src="https://github.com/VanirLab/commi3/blob/master/commi3.png" height="142" />
+ <p align="center">
+ <a href="https://api.travis-ci.org/VanirLab/commi3"><img alt="Build Status" src="https://api.travis-ci.org/VanirLab/commi3.svg?branch=master"></a>
+ <a href="https://github.com/VanirLab/commi3/releases/tag/><img alt="Version 1.0" src="https://img.shields.io/badge/Version-1.0-green.svg"></a>
+ <a href="http://www.python.org/download/"><img alt="Python 3.6-3.7" src="https://img.shields.io/badge/Python-3.6--3.7-yellow.svg"></a>
+ <a href="https://github.com/VanirLab/commi3/blob/master/readme/COPYING"><img alt="MIT License" src="https://img.shields.io/badge/License-MIT-red.svg"></a>
+ <a href="https://badge.fury.io/py/Commi3"><img src="https://badge.fury.io/py/Commi3.svg" alt="PyPI version" height="18"></a>
+ </p>
+</p>
+
+## General Information
+
+**Commi3** (short for [**c**]ryptoanalytic [**o**]ffensive [**m**]ultifunctional [**m**]icrostructure [**i**]njection [**3**] generation 3) is an Automated Commando Line Tool (ACLT)
+that can be used from web developers, penetration testers or even security researchers in order to test web-based applications
+with the view to find bugs, errors or vulnerabilities related to **[command injection](https://www.owasp.org/index.php/Command_Injection)** attacks.
+ By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or HTTP/HTTPS header.
+
+## Legal Disclaimer
+
+**With each commi3 run end users are obligated to agree** with the following prelude message:
+```
+(!) Legal disclaimer: Usage of Commi3 for attacking targets without prior mutual consent is illegal.
+It is the end user's responsibility to obey all applicable local, state and federal laws.
+Developers assume no liability and are not responsible for any misuse or damage caused by this program.
+```
+
+## Requirements
+
+**[Python](http://www.python.org/download/)** version **3.6.x** or **3.7.x** is required for running this program.
+
+## Installation
+
+Download commi3 by cloning the Git repository:
+
+ git clone https://github.com/VanirLab/commi3.git commi3
+
+Commi3 comes packaged on the **official repositories** of the following Linux distributions, so you can use the **package manager** to install it!
+
+- [ArchStrike](https://archstrike.org/)
+- [BlackArch Linux](http://blackarch.org/)
+- [BackBox](https://backbox.org/)
+- [Kali Linux](https://www.kali.org/)
+- [Parrot Security OS](https://www.parrotsec.org/)
+- [Pentoo Linux](https://www.pentoo.ch/)
+- [Weakerthan Linux](http://www.weaknetlabs.com/)
+
+Commi3 also comes **as a plugin**, on the following penetration testing frameworks:
+
+- [TrustedSec's Penetration Testers Framework (PTF)](https://github.com/trustedsec/ptf)
+- [OWASP Offensive Web Testing Framework (OWTF)](https://github.com/owtf/owtf)
+- [CTF-Tools](https://github.com/zardus/ctf-tools)
+- [PentestBox](https://tools.pentestbox.com/)
+- [PenBox](https://github.com/x3omdax/PenBox)
+- [Katoolin](https://github.com/LionSec/katoolin)
+- [Aptive's Penetration Testing tools](https://github.com/Aptive/penetration-testing-tools)
+- [Homebrew Tap - Pen Test Tools ](https://github.com/sidaf/homebrew-pentest)
+
+## Supported Platforms
+
+- Linux
+- Mac OS X
+- Windows
+
+## Usage
+
+To get a list of all options and switches use:
+
+ python commi3.py -h & python3 commi3.py -h
+
+
+
+
+%package help
+Summary: Development documents and examples for Commi3
+Provides: python3-Commi3-doc
+%description help
+<p align="center">
+ <img alt="VanirLab" src="https://github.com/VanirLab/commi3/blob/master/commi3.png" height="142" />
+ <p align="center">
+ <a href="https://api.travis-ci.org/VanirLab/commi3"><img alt="Build Status" src="https://api.travis-ci.org/VanirLab/commi3.svg?branch=master"></a>
+ <a href="https://github.com/VanirLab/commi3/releases/tag/><img alt="Version 1.0" src="https://img.shields.io/badge/Version-1.0-green.svg"></a>
+ <a href="http://www.python.org/download/"><img alt="Python 3.6-3.7" src="https://img.shields.io/badge/Python-3.6--3.7-yellow.svg"></a>
+ <a href="https://github.com/VanirLab/commi3/blob/master/readme/COPYING"><img alt="MIT License" src="https://img.shields.io/badge/License-MIT-red.svg"></a>
+ <a href="https://badge.fury.io/py/Commi3"><img src="https://badge.fury.io/py/Commi3.svg" alt="PyPI version" height="18"></a>
+ </p>
+</p>
+
+## General Information
+
+**Commi3** (short for [**c**]ryptoanalytic [**o**]ffensive [**m**]ultifunctional [**m**]icrostructure [**i**]njection [**3**] generation 3) is an Automated Commando Line Tool (ACLT)
+that can be used from web developers, penetration testers or even security researchers in order to test web-based applications
+with the view to find bugs, errors or vulnerabilities related to **[command injection](https://www.owasp.org/index.php/Command_Injection)** attacks.
+ By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or HTTP/HTTPS header.
+
+## Legal Disclaimer
+
+**With each commi3 run end users are obligated to agree** with the following prelude message:
+```
+(!) Legal disclaimer: Usage of Commi3 for attacking targets without prior mutual consent is illegal.
+It is the end user's responsibility to obey all applicable local, state and federal laws.
+Developers assume no liability and are not responsible for any misuse or damage caused by this program.
+```
+
+## Requirements
+
+**[Python](http://www.python.org/download/)** version **3.6.x** or **3.7.x** is required for running this program.
+
+## Installation
+
+Download commi3 by cloning the Git repository:
+
+ git clone https://github.com/VanirLab/commi3.git commi3
+
+Commi3 comes packaged on the **official repositories** of the following Linux distributions, so you can use the **package manager** to install it!
+
+- [ArchStrike](https://archstrike.org/)
+- [BlackArch Linux](http://blackarch.org/)
+- [BackBox](https://backbox.org/)
+- [Kali Linux](https://www.kali.org/)
+- [Parrot Security OS](https://www.parrotsec.org/)
+- [Pentoo Linux](https://www.pentoo.ch/)
+- [Weakerthan Linux](http://www.weaknetlabs.com/)
+
+Commi3 also comes **as a plugin**, on the following penetration testing frameworks:
+
+- [TrustedSec's Penetration Testers Framework (PTF)](https://github.com/trustedsec/ptf)
+- [OWASP Offensive Web Testing Framework (OWTF)](https://github.com/owtf/owtf)
+- [CTF-Tools](https://github.com/zardus/ctf-tools)
+- [PentestBox](https://tools.pentestbox.com/)
+- [PenBox](https://github.com/x3omdax/PenBox)
+- [Katoolin](https://github.com/LionSec/katoolin)
+- [Aptive's Penetration Testing tools](https://github.com/Aptive/penetration-testing-tools)
+- [Homebrew Tap - Pen Test Tools ](https://github.com/sidaf/homebrew-pentest)
+
+## Supported Platforms
+
+- Linux
+- Mac OS X
+- Windows
+
+## Usage
+
+To get a list of all options and switches use:
+
+ python commi3.py -h & python3 commi3.py -h
+
+
+
+
+%prep
+%autosetup -n Commi3-1.0.7
+
+%build
+%py3_build
+
+%install
+%py3_install
+install -d -m755 %{buildroot}/%{_pkgdocdir}
+if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
+if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
+if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
+if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
+pushd %{buildroot}
+if [ -d usr/lib ]; then
+ find usr/lib -type f -printf "\"/%h/%f\"\n" >> filelist.lst
+fi
+if [ -d usr/lib64 ]; then
+ find usr/lib64 -type f -printf "\"/%h/%f\"\n" >> filelist.lst
+fi
+if [ -d usr/bin ]; then
+ find usr/bin -type f -printf "\"/%h/%f\"\n" >> filelist.lst
+fi
+if [ -d usr/sbin ]; then
+ find usr/sbin -type f -printf "\"/%h/%f\"\n" >> filelist.lst
+fi
+touch doclist.lst
+if [ -d usr/share/man ]; then
+ find usr/share/man -type f -printf "\"/%h/%f.gz\"\n" >> doclist.lst
+fi
+popd
+mv %{buildroot}/filelist.lst .
+mv %{buildroot}/doclist.lst .
+
+%files -n python3-Commi3 -f filelist.lst
+%dir %{python3_sitelib}/*
+
+%files help -f doclist.lst
+%{_docdir}/*
+
+%changelog
+* Tue Jun 20 2023 Python_Bot <Python_Bot@openeuler.org> - 1.0.7-1
+- Package Spec generated
diff --git a/sources b/sources
new file mode 100644
index 0000000..b2503ff
--- /dev/null
+++ b/sources
@@ -0,0 +1 @@
+fc1ee7b7c3e80b167737c24d95547bd6 Commi3-1.0.7.tar.gz