diff options
author | CoprDistGit <infra@openeuler.org> | 2023-04-10 04:53:31 +0000 |
---|---|---|
committer | CoprDistGit <infra@openeuler.org> | 2023-04-10 04:53:31 +0000 |
commit | 3bdb7b5200ea9f05729cd7daac51c79906942228 (patch) | |
tree | 0d567b2a38b95a09e2e5f5961c3a556a25f53620 | |
parent | 8329d9506636dd1eb2b9aa3a23b323e78cdab719 (diff) |
automatic import of python-scanless
-rw-r--r-- | .gitignore | 1 | ||||
-rw-r--r-- | python-scanless.spec | 236 | ||||
-rw-r--r-- | sources | 2 |
3 files changed, 147 insertions, 92 deletions
@@ -1 +1,2 @@ /scanless-2.1.6.tar.gz +/scanless-2.2.1.tar.gz diff --git a/python-scanless.spec b/python-scanless.spec index 68c5e1e..131ff4f 100644 --- a/python-scanless.spec +++ b/python-scanless.spec @@ -1,22 +1,21 @@ %global _empty_manifest_terminate_build 0 Name: python-scanless -Version: 2.1.6 +Version: 2.2.1 Release: 1 Summary: An online port scan scraper. License: Unlicense URL: https://github.com/vesche/scanless -Source0: https://mirrors.nju.edu.cn/pypi/web/packages/44/0c/a397efb5777d22b49e92e009bc5907c96ac845ffa57d43e3356779c1954f/scanless-2.1.6.tar.gz +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/50/d0/89d4922f4f6f0faa3be4f6ae455a13d049068ae45a83ec70cf795cd7ae06/scanless-2.2.1.tar.gz BuildArch: noarch %description # scanless -This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf. +This is a Python command-line utility and library for using websites that can perform port scans on your behalf. ## Supported Online Port Scanners -* [hackertarget](https://hackertarget.com/nmap-online-port-scanner/) * [ipfingerprints](http://www.ipfingerprints.com/portscan.php) * [spiderip](https://spiderip.com/online-port-scan.php) * [standingtech](https://portscanner.standingtech.com/) @@ -33,18 +32,18 @@ $ pip install scanless --user ## CLI Usage ``` -$ scanless --help -usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] +$ scanless --help +usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] [-d] scanless, an online port scan scraper. -optional arguments: +options: -h, --help show this help message and exit -v, --version display the current version -t TARGET, --target TARGET ip or domain to scan -s SCANNER, --scanner SCANNER - scanner to use (default: hackertarget) + scanner to use (default: yougetsignal) -r, --random use a random scanner -l, --list list scanners -a, --all use all the scanners @@ -54,7 +53,6 @@ $ scanless --list +----------------+--------------------------------------+ | Scanner Name | Website | +----------------+--------------------------------------+ -| hackertarget | https://hackertarget.com | | ipfingerprints | https://www.ipfingerprints.com | | spiderip | https://spiderip.com | | standingtech | https://portscanner.standingtech.com | @@ -63,7 +61,7 @@ $ scanless --list +----------------+--------------------------------------+ $ scanless -t scanme.nmap.org -s spiderip -Running scanless v2.1.6... +Running scanless v2.2.1 ... spiderip: PORT STATE SERVICE @@ -90,20 +88,29 @@ PORT STATE SERVICE ``` >>> import scanless >>> sl = scanless.Scanless() ->>> output = sl.scan('scanme.nmap.org', scanner='hackertarget') +>>> output = sl.scan('scanme.nmap.org', scanner='yougetsignal') >>> print(output['raw']) -Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC -Nmap scan report for scanme.nmap.org (45.33.32.156) -Host is up (0.065s latency). -Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f - -PORT STATE SERVICE -21/tcp closed ftp -22/tcp open ssh -80/tcp open http -443/tcp closed https - -Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds +PORT STATE SERVICE +21/tcp closed ftp +22/tcp open ssh +23/tcp closed telnet +25/tcp closed smtp +53/tcp closed domain +80/tcp open http +110/tcp closed pop3 +115/tcp closed sftp +135/tcp closed msrpc +139/tcp closed netbios-ssn +143/tcp closed imap +194/tcp closed irc +443/tcp closed https +445/tcp closed microsoft-ds +1433/tcp closed ms-sql-s +3306/tcp closed mysql +3389/tcp closed ms-wbt-server +5632/tcp closed pcanywherestat +5900/tcp closed vnc +6112/tcp closed dtspc >>> import json >>> print(json.dumps(output['parsed'], indent=2)) [ @@ -120,23 +127,34 @@ Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds "protocol": "tcp" }, { - "port": "80", - "state": "open", - "service": "http", + "port": "23", + "state": "closed", + "service": "telnet", "protocol": "tcp" }, { - "port": "443", + "port": "25", "state": "closed", - "service": "https", + "service": "smtp", + "protocol": "tcp" + }, + { + "port": "53", + "state": "closed", + "service": "domain", + "protocol": "tcp" + }, + { + "port": "80", + "state": "open", + "service": "http", "protocol": "tcp" - } + }, + ... ] ``` - - %package -n python3-scanless Summary: An online port scan scraper. Provides: python-scanless @@ -146,11 +164,10 @@ BuildRequires: python3-pip %description -n python3-scanless # scanless -This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf. +This is a Python command-line utility and library for using websites that can perform port scans on your behalf. ## Supported Online Port Scanners -* [hackertarget](https://hackertarget.com/nmap-online-port-scanner/) * [ipfingerprints](http://www.ipfingerprints.com/portscan.php) * [spiderip](https://spiderip.com/online-port-scan.php) * [standingtech](https://portscanner.standingtech.com/) @@ -167,18 +184,18 @@ $ pip install scanless --user ## CLI Usage ``` -$ scanless --help -usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] +$ scanless --help +usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] [-d] scanless, an online port scan scraper. -optional arguments: +options: -h, --help show this help message and exit -v, --version display the current version -t TARGET, --target TARGET ip or domain to scan -s SCANNER, --scanner SCANNER - scanner to use (default: hackertarget) + scanner to use (default: yougetsignal) -r, --random use a random scanner -l, --list list scanners -a, --all use all the scanners @@ -188,7 +205,6 @@ $ scanless --list +----------------+--------------------------------------+ | Scanner Name | Website | +----------------+--------------------------------------+ -| hackertarget | https://hackertarget.com | | ipfingerprints | https://www.ipfingerprints.com | | spiderip | https://spiderip.com | | standingtech | https://portscanner.standingtech.com | @@ -197,7 +213,7 @@ $ scanless --list +----------------+--------------------------------------+ $ scanless -t scanme.nmap.org -s spiderip -Running scanless v2.1.6... +Running scanless v2.2.1 ... spiderip: PORT STATE SERVICE @@ -224,20 +240,29 @@ PORT STATE SERVICE ``` >>> import scanless >>> sl = scanless.Scanless() ->>> output = sl.scan('scanme.nmap.org', scanner='hackertarget') +>>> output = sl.scan('scanme.nmap.org', scanner='yougetsignal') >>> print(output['raw']) -Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC -Nmap scan report for scanme.nmap.org (45.33.32.156) -Host is up (0.065s latency). -Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f - -PORT STATE SERVICE -21/tcp closed ftp -22/tcp open ssh -80/tcp open http -443/tcp closed https - -Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds +PORT STATE SERVICE +21/tcp closed ftp +22/tcp open ssh +23/tcp closed telnet +25/tcp closed smtp +53/tcp closed domain +80/tcp open http +110/tcp closed pop3 +115/tcp closed sftp +135/tcp closed msrpc +139/tcp closed netbios-ssn +143/tcp closed imap +194/tcp closed irc +443/tcp closed https +445/tcp closed microsoft-ds +1433/tcp closed ms-sql-s +3306/tcp closed mysql +3389/tcp closed ms-wbt-server +5632/tcp closed pcanywherestat +5900/tcp closed vnc +6112/tcp closed dtspc >>> import json >>> print(json.dumps(output['parsed'], indent=2)) [ @@ -254,34 +279,44 @@ Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds "protocol": "tcp" }, { - "port": "80", - "state": "open", - "service": "http", + "port": "23", + "state": "closed", + "service": "telnet", + "protocol": "tcp" + }, + { + "port": "25", + "state": "closed", + "service": "smtp", "protocol": "tcp" }, { - "port": "443", + "port": "53", "state": "closed", - "service": "https", + "service": "domain", + "protocol": "tcp" + }, + { + "port": "80", + "state": "open", + "service": "http", "protocol": "tcp" - } + }, + ... ] ``` - - %package help Summary: Development documents and examples for scanless Provides: python3-scanless-doc %description help # scanless -This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf. +This is a Python command-line utility and library for using websites that can perform port scans on your behalf. ## Supported Online Port Scanners -* [hackertarget](https://hackertarget.com/nmap-online-port-scanner/) * [ipfingerprints](http://www.ipfingerprints.com/portscan.php) * [spiderip](https://spiderip.com/online-port-scan.php) * [standingtech](https://portscanner.standingtech.com/) @@ -298,18 +333,18 @@ $ pip install scanless --user ## CLI Usage ``` -$ scanless --help -usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] +$ scanless --help +usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] [-d] scanless, an online port scan scraper. -optional arguments: +options: -h, --help show this help message and exit -v, --version display the current version -t TARGET, --target TARGET ip or domain to scan -s SCANNER, --scanner SCANNER - scanner to use (default: hackertarget) + scanner to use (default: yougetsignal) -r, --random use a random scanner -l, --list list scanners -a, --all use all the scanners @@ -319,7 +354,6 @@ $ scanless --list +----------------+--------------------------------------+ | Scanner Name | Website | +----------------+--------------------------------------+ -| hackertarget | https://hackertarget.com | | ipfingerprints | https://www.ipfingerprints.com | | spiderip | https://spiderip.com | | standingtech | https://portscanner.standingtech.com | @@ -328,7 +362,7 @@ $ scanless --list +----------------+--------------------------------------+ $ scanless -t scanme.nmap.org -s spiderip -Running scanless v2.1.6... +Running scanless v2.2.1 ... spiderip: PORT STATE SERVICE @@ -355,20 +389,29 @@ PORT STATE SERVICE ``` >>> import scanless >>> sl = scanless.Scanless() ->>> output = sl.scan('scanme.nmap.org', scanner='hackertarget') +>>> output = sl.scan('scanme.nmap.org', scanner='yougetsignal') >>> print(output['raw']) -Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC -Nmap scan report for scanme.nmap.org (45.33.32.156) -Host is up (0.065s latency). -Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f - -PORT STATE SERVICE -21/tcp closed ftp -22/tcp open ssh -80/tcp open http -443/tcp closed https - -Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds +PORT STATE SERVICE +21/tcp closed ftp +22/tcp open ssh +23/tcp closed telnet +25/tcp closed smtp +53/tcp closed domain +80/tcp open http +110/tcp closed pop3 +115/tcp closed sftp +135/tcp closed msrpc +139/tcp closed netbios-ssn +143/tcp closed imap +194/tcp closed irc +443/tcp closed https +445/tcp closed microsoft-ds +1433/tcp closed ms-sql-s +3306/tcp closed mysql +3389/tcp closed ms-wbt-server +5632/tcp closed pcanywherestat +5900/tcp closed vnc +6112/tcp closed dtspc >>> import json >>> print(json.dumps(output['parsed'], indent=2)) [ @@ -385,25 +428,36 @@ Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds "protocol": "tcp" }, { - "port": "80", - "state": "open", - "service": "http", + "port": "23", + "state": "closed", + "service": "telnet", "protocol": "tcp" }, { - "port": "443", + "port": "25", "state": "closed", - "service": "https", + "service": "smtp", "protocol": "tcp" - } + }, + { + "port": "53", + "state": "closed", + "service": "domain", + "protocol": "tcp" + }, + { + "port": "80", + "state": "open", + "service": "http", + "protocol": "tcp" + }, + ... ] ``` - - %prep -%autosetup -n scanless-2.1.6 +%autosetup -n scanless-2.2.1 %build %py3_build @@ -443,5 +497,5 @@ mv %{buildroot}/doclist.lst . %{_docdir}/* %changelog -* Thu Mar 09 2023 Python_Bot <Python_Bot@openeuler.org> - 2.1.6-1 +* Mon Apr 10 2023 Python_Bot <Python_Bot@openeuler.org> - 2.2.1-1 - Package Spec generated @@ -1 +1 @@ -03c6a26e7f49472823713ab936e81023 scanless-2.1.6.tar.gz +f1e67d8fbe6aa278ad6b6e8d9a7546dc scanless-2.2.1.tar.gz |