summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2023-04-10 04:53:31 +0000
committerCoprDistGit <infra@openeuler.org>2023-04-10 04:53:31 +0000
commit3bdb7b5200ea9f05729cd7daac51c79906942228 (patch)
tree0d567b2a38b95a09e2e5f5961c3a556a25f53620
parent8329d9506636dd1eb2b9aa3a23b323e78cdab719 (diff)
automatic import of python-scanless
-rw-r--r--.gitignore1
-rw-r--r--python-scanless.spec236
-rw-r--r--sources2
3 files changed, 147 insertions, 92 deletions
diff --git a/.gitignore b/.gitignore
index fb1d863..1be58bd 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1 +1,2 @@
/scanless-2.1.6.tar.gz
+/scanless-2.2.1.tar.gz
diff --git a/python-scanless.spec b/python-scanless.spec
index 68c5e1e..131ff4f 100644
--- a/python-scanless.spec
+++ b/python-scanless.spec
@@ -1,22 +1,21 @@
%global _empty_manifest_terminate_build 0
Name: python-scanless
-Version: 2.1.6
+Version: 2.2.1
Release: 1
Summary: An online port scan scraper.
License: Unlicense
URL: https://github.com/vesche/scanless
-Source0: https://mirrors.nju.edu.cn/pypi/web/packages/44/0c/a397efb5777d22b49e92e009bc5907c96ac845ffa57d43e3356779c1954f/scanless-2.1.6.tar.gz
+Source0: https://mirrors.nju.edu.cn/pypi/web/packages/50/d0/89d4922f4f6f0faa3be4f6ae455a13d049068ae45a83ec70cf795cd7ae06/scanless-2.2.1.tar.gz
BuildArch: noarch
%description
# scanless
-This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf.
+This is a Python command-line utility and library for using websites that can perform port scans on your behalf.
## Supported Online Port Scanners
-* [hackertarget](https://hackertarget.com/nmap-online-port-scanner/)
* [ipfingerprints](http://www.ipfingerprints.com/portscan.php)
* [spiderip](https://spiderip.com/online-port-scan.php)
* [standingtech](https://portscanner.standingtech.com/)
@@ -33,18 +32,18 @@ $ pip install scanless --user
## CLI Usage
```
-$ scanless --help
-usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a]
+$ scanless --help
+usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] [-d]
scanless, an online port scan scraper.
-optional arguments:
+options:
-h, --help show this help message and exit
-v, --version display the current version
-t TARGET, --target TARGET
ip or domain to scan
-s SCANNER, --scanner SCANNER
- scanner to use (default: hackertarget)
+ scanner to use (default: yougetsignal)
-r, --random use a random scanner
-l, --list list scanners
-a, --all use all the scanners
@@ -54,7 +53,6 @@ $ scanless --list
+----------------+--------------------------------------+
| Scanner Name | Website |
+----------------+--------------------------------------+
-| hackertarget | https://hackertarget.com |
| ipfingerprints | https://www.ipfingerprints.com |
| spiderip | https://spiderip.com |
| standingtech | https://portscanner.standingtech.com |
@@ -63,7 +61,7 @@ $ scanless --list
+----------------+--------------------------------------+
$ scanless -t scanme.nmap.org -s spiderip
-Running scanless v2.1.6...
+Running scanless v2.2.1 ...
spiderip:
PORT STATE SERVICE
@@ -90,20 +88,29 @@ PORT STATE SERVICE
```
>>> import scanless
>>> sl = scanless.Scanless()
->>> output = sl.scan('scanme.nmap.org', scanner='hackertarget')
+>>> output = sl.scan('scanme.nmap.org', scanner='yougetsignal')
>>> print(output['raw'])
-Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC
-Nmap scan report for scanme.nmap.org (45.33.32.156)
-Host is up (0.065s latency).
-Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
-
-PORT STATE SERVICE
-21/tcp closed ftp
-22/tcp open ssh
-80/tcp open http
-443/tcp closed https
-
-Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
+PORT STATE SERVICE
+21/tcp closed ftp
+22/tcp open ssh
+23/tcp closed telnet
+25/tcp closed smtp
+53/tcp closed domain
+80/tcp open http
+110/tcp closed pop3
+115/tcp closed sftp
+135/tcp closed msrpc
+139/tcp closed netbios-ssn
+143/tcp closed imap
+194/tcp closed irc
+443/tcp closed https
+445/tcp closed microsoft-ds
+1433/tcp closed ms-sql-s
+3306/tcp closed mysql
+3389/tcp closed ms-wbt-server
+5632/tcp closed pcanywherestat
+5900/tcp closed vnc
+6112/tcp closed dtspc
>>> import json
>>> print(json.dumps(output['parsed'], indent=2))
[
@@ -120,23 +127,34 @@ Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
"protocol": "tcp"
},
{
- "port": "80",
- "state": "open",
- "service": "http",
+ "port": "23",
+ "state": "closed",
+ "service": "telnet",
"protocol": "tcp"
},
{
- "port": "443",
+ "port": "25",
"state": "closed",
- "service": "https",
+ "service": "smtp",
+ "protocol": "tcp"
+ },
+ {
+ "port": "53",
+ "state": "closed",
+ "service": "domain",
+ "protocol": "tcp"
+ },
+ {
+ "port": "80",
+ "state": "open",
+ "service": "http",
"protocol": "tcp"
- }
+ },
+ ...
]
```
-
-
%package -n python3-scanless
Summary: An online port scan scraper.
Provides: python-scanless
@@ -146,11 +164,10 @@ BuildRequires: python3-pip
%description -n python3-scanless
# scanless
-This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf.
+This is a Python command-line utility and library for using websites that can perform port scans on your behalf.
## Supported Online Port Scanners
-* [hackertarget](https://hackertarget.com/nmap-online-port-scanner/)
* [ipfingerprints](http://www.ipfingerprints.com/portscan.php)
* [spiderip](https://spiderip.com/online-port-scan.php)
* [standingtech](https://portscanner.standingtech.com/)
@@ -167,18 +184,18 @@ $ pip install scanless --user
## CLI Usage
```
-$ scanless --help
-usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a]
+$ scanless --help
+usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] [-d]
scanless, an online port scan scraper.
-optional arguments:
+options:
-h, --help show this help message and exit
-v, --version display the current version
-t TARGET, --target TARGET
ip or domain to scan
-s SCANNER, --scanner SCANNER
- scanner to use (default: hackertarget)
+ scanner to use (default: yougetsignal)
-r, --random use a random scanner
-l, --list list scanners
-a, --all use all the scanners
@@ -188,7 +205,6 @@ $ scanless --list
+----------------+--------------------------------------+
| Scanner Name | Website |
+----------------+--------------------------------------+
-| hackertarget | https://hackertarget.com |
| ipfingerprints | https://www.ipfingerprints.com |
| spiderip | https://spiderip.com |
| standingtech | https://portscanner.standingtech.com |
@@ -197,7 +213,7 @@ $ scanless --list
+----------------+--------------------------------------+
$ scanless -t scanme.nmap.org -s spiderip
-Running scanless v2.1.6...
+Running scanless v2.2.1 ...
spiderip:
PORT STATE SERVICE
@@ -224,20 +240,29 @@ PORT STATE SERVICE
```
>>> import scanless
>>> sl = scanless.Scanless()
->>> output = sl.scan('scanme.nmap.org', scanner='hackertarget')
+>>> output = sl.scan('scanme.nmap.org', scanner='yougetsignal')
>>> print(output['raw'])
-Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC
-Nmap scan report for scanme.nmap.org (45.33.32.156)
-Host is up (0.065s latency).
-Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
-
-PORT STATE SERVICE
-21/tcp closed ftp
-22/tcp open ssh
-80/tcp open http
-443/tcp closed https
-
-Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
+PORT STATE SERVICE
+21/tcp closed ftp
+22/tcp open ssh
+23/tcp closed telnet
+25/tcp closed smtp
+53/tcp closed domain
+80/tcp open http
+110/tcp closed pop3
+115/tcp closed sftp
+135/tcp closed msrpc
+139/tcp closed netbios-ssn
+143/tcp closed imap
+194/tcp closed irc
+443/tcp closed https
+445/tcp closed microsoft-ds
+1433/tcp closed ms-sql-s
+3306/tcp closed mysql
+3389/tcp closed ms-wbt-server
+5632/tcp closed pcanywherestat
+5900/tcp closed vnc
+6112/tcp closed dtspc
>>> import json
>>> print(json.dumps(output['parsed'], indent=2))
[
@@ -254,34 +279,44 @@ Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
"protocol": "tcp"
},
{
- "port": "80",
- "state": "open",
- "service": "http",
+ "port": "23",
+ "state": "closed",
+ "service": "telnet",
+ "protocol": "tcp"
+ },
+ {
+ "port": "25",
+ "state": "closed",
+ "service": "smtp",
"protocol": "tcp"
},
{
- "port": "443",
+ "port": "53",
"state": "closed",
- "service": "https",
+ "service": "domain",
+ "protocol": "tcp"
+ },
+ {
+ "port": "80",
+ "state": "open",
+ "service": "http",
"protocol": "tcp"
- }
+ },
+ ...
]
```
-
-
%package help
Summary: Development documents and examples for scanless
Provides: python3-scanless-doc
%description help
# scanless
-This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf.
+This is a Python command-line utility and library for using websites that can perform port scans on your behalf.
## Supported Online Port Scanners
-* [hackertarget](https://hackertarget.com/nmap-online-port-scanner/)
* [ipfingerprints](http://www.ipfingerprints.com/portscan.php)
* [spiderip](https://spiderip.com/online-port-scan.php)
* [standingtech](https://portscanner.standingtech.com/)
@@ -298,18 +333,18 @@ $ pip install scanless --user
## CLI Usage
```
-$ scanless --help
-usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a]
+$ scanless --help
+usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] [-d]
scanless, an online port scan scraper.
-optional arguments:
+options:
-h, --help show this help message and exit
-v, --version display the current version
-t TARGET, --target TARGET
ip or domain to scan
-s SCANNER, --scanner SCANNER
- scanner to use (default: hackertarget)
+ scanner to use (default: yougetsignal)
-r, --random use a random scanner
-l, --list list scanners
-a, --all use all the scanners
@@ -319,7 +354,6 @@ $ scanless --list
+----------------+--------------------------------------+
| Scanner Name | Website |
+----------------+--------------------------------------+
-| hackertarget | https://hackertarget.com |
| ipfingerprints | https://www.ipfingerprints.com |
| spiderip | https://spiderip.com |
| standingtech | https://portscanner.standingtech.com |
@@ -328,7 +362,7 @@ $ scanless --list
+----------------+--------------------------------------+
$ scanless -t scanme.nmap.org -s spiderip
-Running scanless v2.1.6...
+Running scanless v2.2.1 ...
spiderip:
PORT STATE SERVICE
@@ -355,20 +389,29 @@ PORT STATE SERVICE
```
>>> import scanless
>>> sl = scanless.Scanless()
->>> output = sl.scan('scanme.nmap.org', scanner='hackertarget')
+>>> output = sl.scan('scanme.nmap.org', scanner='yougetsignal')
>>> print(output['raw'])
-Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC
-Nmap scan report for scanme.nmap.org (45.33.32.156)
-Host is up (0.065s latency).
-Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
-
-PORT STATE SERVICE
-21/tcp closed ftp
-22/tcp open ssh
-80/tcp open http
-443/tcp closed https
-
-Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
+PORT STATE SERVICE
+21/tcp closed ftp
+22/tcp open ssh
+23/tcp closed telnet
+25/tcp closed smtp
+53/tcp closed domain
+80/tcp open http
+110/tcp closed pop3
+115/tcp closed sftp
+135/tcp closed msrpc
+139/tcp closed netbios-ssn
+143/tcp closed imap
+194/tcp closed irc
+443/tcp closed https
+445/tcp closed microsoft-ds
+1433/tcp closed ms-sql-s
+3306/tcp closed mysql
+3389/tcp closed ms-wbt-server
+5632/tcp closed pcanywherestat
+5900/tcp closed vnc
+6112/tcp closed dtspc
>>> import json
>>> print(json.dumps(output['parsed'], indent=2))
[
@@ -385,25 +428,36 @@ Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
"protocol": "tcp"
},
{
- "port": "80",
- "state": "open",
- "service": "http",
+ "port": "23",
+ "state": "closed",
+ "service": "telnet",
"protocol": "tcp"
},
{
- "port": "443",
+ "port": "25",
"state": "closed",
- "service": "https",
+ "service": "smtp",
"protocol": "tcp"
- }
+ },
+ {
+ "port": "53",
+ "state": "closed",
+ "service": "domain",
+ "protocol": "tcp"
+ },
+ {
+ "port": "80",
+ "state": "open",
+ "service": "http",
+ "protocol": "tcp"
+ },
+ ...
]
```
-
-
%prep
-%autosetup -n scanless-2.1.6
+%autosetup -n scanless-2.2.1
%build
%py3_build
@@ -443,5 +497,5 @@ mv %{buildroot}/doclist.lst .
%{_docdir}/*
%changelog
-* Thu Mar 09 2023 Python_Bot <Python_Bot@openeuler.org> - 2.1.6-1
+* Mon Apr 10 2023 Python_Bot <Python_Bot@openeuler.org> - 2.2.1-1
- Package Spec generated
diff --git a/sources b/sources
index ef04d63..9965fe5 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-03c6a26e7f49472823713ab936e81023 scanless-2.1.6.tar.gz
+f1e67d8fbe6aa278ad6b6e8d9a7546dc scanless-2.2.1.tar.gz