diff options
author | CoprDistGit <infra@openeuler.org> | 2023-03-09 16:41:32 +0000 |
---|---|---|
committer | CoprDistGit <infra@openeuler.org> | 2023-03-09 16:41:32 +0000 |
commit | 8329d9506636dd1eb2b9aa3a23b323e78cdab719 (patch) | |
tree | e8b9231aca06c896adb935e6b51d1185873fd029 | |
parent | f48e69abbd5989ba377ca855479f46ec45989c69 (diff) |
automatic import of python-scanless
-rw-r--r-- | .gitignore | 1 | ||||
-rw-r--r-- | python-scanless.spec | 447 | ||||
-rw-r--r-- | sources | 1 |
3 files changed, 449 insertions, 0 deletions
@@ -0,0 +1 @@ +/scanless-2.1.6.tar.gz diff --git a/python-scanless.spec b/python-scanless.spec new file mode 100644 index 0000000..68c5e1e --- /dev/null +++ b/python-scanless.spec @@ -0,0 +1,447 @@ +%global _empty_manifest_terminate_build 0 +Name: python-scanless +Version: 2.1.6 +Release: 1 +Summary: An online port scan scraper. +License: Unlicense +URL: https://github.com/vesche/scanless +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/44/0c/a397efb5777d22b49e92e009bc5907c96ac845ffa57d43e3356779c1954f/scanless-2.1.6.tar.gz +BuildArch: noarch + + +%description +# scanless + +This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf. + +## Supported Online Port Scanners + +* [hackertarget](https://hackertarget.com/nmap-online-port-scanner/) +* [ipfingerprints](http://www.ipfingerprints.com/portscan.php) +* [spiderip](https://spiderip.com/online-port-scan.php) +* [standingtech](https://portscanner.standingtech.com/) +* [viewdns](http://viewdns.info/) +* [yougetsignal](http://www.yougetsignal.com/tools/open-ports/) + +## Install + +Do it up: +``` +$ pip install scanless --user +``` + +## CLI Usage + +``` +$ scanless --help +usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] + +scanless, an online port scan scraper. + +optional arguments: + -h, --help show this help message and exit + -v, --version display the current version + -t TARGET, --target TARGET + ip or domain to scan + -s SCANNER, --scanner SCANNER + scanner to use (default: hackertarget) + -r, --random use a random scanner + -l, --list list scanners + -a, --all use all the scanners + -d, --debug debug mode (cli mode off & show network errors) + +$ scanless --list ++----------------+--------------------------------------+ +| Scanner Name | Website | ++----------------+--------------------------------------+ +| hackertarget | https://hackertarget.com | +| ipfingerprints | https://www.ipfingerprints.com | +| spiderip | https://spiderip.com | +| standingtech | https://portscanner.standingtech.com | +| viewdns | https://viewdns.info | +| yougetsignal | https://www.yougetsignal.com | ++----------------+--------------------------------------+ + +$ scanless -t scanme.nmap.org -s spiderip +Running scanless v2.1.6... + +spiderip: +PORT STATE SERVICE +21/tcp closed ftp +22/tcp open ssh +25/tcp closed smtp +80/tcp open http +110/tcp closed pop3 +143/tcp closed imap +443/tcp closed https +465/tcp closed smtps +993/tcp closed imaps +995/tcp closed pop3s +1433/tcp closed ms-sql-s +3306/tcp closed mysql +3389/tcp closed ms-wbt-server +5900/tcp closed vnc +8080/tcp closed http-proxy +8443/tcp closed https-alt +``` + +## Library Usage + +``` +>>> import scanless +>>> sl = scanless.Scanless() +>>> output = sl.scan('scanme.nmap.org', scanner='hackertarget') +>>> print(output['raw']) +Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC +Nmap scan report for scanme.nmap.org (45.33.32.156) +Host is up (0.065s latency). +Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f + +PORT STATE SERVICE +21/tcp closed ftp +22/tcp open ssh +80/tcp open http +443/tcp closed https + +Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds +>>> import json +>>> print(json.dumps(output['parsed'], indent=2)) +[ + { + "port": "21", + "state": "closed", + "service": "ftp", + "protocol": "tcp" + }, + { + "port": "22", + "state": "open", + "service": "ssh", + "protocol": "tcp" + }, + { + "port": "80", + "state": "open", + "service": "http", + "protocol": "tcp" + }, + { + "port": "443", + "state": "closed", + "service": "https", + "protocol": "tcp" + } +] +``` + + + + +%package -n python3-scanless +Summary: An online port scan scraper. +Provides: python-scanless +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-scanless +# scanless + +This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf. + +## Supported Online Port Scanners + +* [hackertarget](https://hackertarget.com/nmap-online-port-scanner/) +* [ipfingerprints](http://www.ipfingerprints.com/portscan.php) +* [spiderip](https://spiderip.com/online-port-scan.php) +* [standingtech](https://portscanner.standingtech.com/) +* [viewdns](http://viewdns.info/) +* [yougetsignal](http://www.yougetsignal.com/tools/open-ports/) + +## Install + +Do it up: +``` +$ pip install scanless --user +``` + +## CLI Usage + +``` +$ scanless --help +usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] + +scanless, an online port scan scraper. + +optional arguments: + -h, --help show this help message and exit + -v, --version display the current version + -t TARGET, --target TARGET + ip or domain to scan + -s SCANNER, --scanner SCANNER + scanner to use (default: hackertarget) + -r, --random use a random scanner + -l, --list list scanners + -a, --all use all the scanners + -d, --debug debug mode (cli mode off & show network errors) + +$ scanless --list ++----------------+--------------------------------------+ +| Scanner Name | Website | ++----------------+--------------------------------------+ +| hackertarget | https://hackertarget.com | +| ipfingerprints | https://www.ipfingerprints.com | +| spiderip | https://spiderip.com | +| standingtech | https://portscanner.standingtech.com | +| viewdns | https://viewdns.info | +| yougetsignal | https://www.yougetsignal.com | ++----------------+--------------------------------------+ + +$ scanless -t scanme.nmap.org -s spiderip +Running scanless v2.1.6... + +spiderip: +PORT STATE SERVICE +21/tcp closed ftp +22/tcp open ssh +25/tcp closed smtp +80/tcp open http +110/tcp closed pop3 +143/tcp closed imap +443/tcp closed https +465/tcp closed smtps +993/tcp closed imaps +995/tcp closed pop3s +1433/tcp closed ms-sql-s +3306/tcp closed mysql +3389/tcp closed ms-wbt-server +5900/tcp closed vnc +8080/tcp closed http-proxy +8443/tcp closed https-alt +``` + +## Library Usage + +``` +>>> import scanless +>>> sl = scanless.Scanless() +>>> output = sl.scan('scanme.nmap.org', scanner='hackertarget') +>>> print(output['raw']) +Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC +Nmap scan report for scanme.nmap.org (45.33.32.156) +Host is up (0.065s latency). +Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f + +PORT STATE SERVICE +21/tcp closed ftp +22/tcp open ssh +80/tcp open http +443/tcp closed https + +Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds +>>> import json +>>> print(json.dumps(output['parsed'], indent=2)) +[ + { + "port": "21", + "state": "closed", + "service": "ftp", + "protocol": "tcp" + }, + { + "port": "22", + "state": "open", + "service": "ssh", + "protocol": "tcp" + }, + { + "port": "80", + "state": "open", + "service": "http", + "protocol": "tcp" + }, + { + "port": "443", + "state": "closed", + "service": "https", + "protocol": "tcp" + } +] +``` + + + + +%package help +Summary: Development documents and examples for scanless +Provides: python3-scanless-doc +%description help +# scanless + +This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf. + +## Supported Online Port Scanners + +* [hackertarget](https://hackertarget.com/nmap-online-port-scanner/) +* [ipfingerprints](http://www.ipfingerprints.com/portscan.php) +* [spiderip](https://spiderip.com/online-port-scan.php) +* [standingtech](https://portscanner.standingtech.com/) +* [viewdns](http://viewdns.info/) +* [yougetsignal](http://www.yougetsignal.com/tools/open-ports/) + +## Install + +Do it up: +``` +$ pip install scanless --user +``` + +## CLI Usage + +``` +$ scanless --help +usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] + +scanless, an online port scan scraper. + +optional arguments: + -h, --help show this help message and exit + -v, --version display the current version + -t TARGET, --target TARGET + ip or domain to scan + -s SCANNER, --scanner SCANNER + scanner to use (default: hackertarget) + -r, --random use a random scanner + -l, --list list scanners + -a, --all use all the scanners + -d, --debug debug mode (cli mode off & show network errors) + +$ scanless --list ++----------------+--------------------------------------+ +| Scanner Name | Website | ++----------------+--------------------------------------+ +| hackertarget | https://hackertarget.com | +| ipfingerprints | https://www.ipfingerprints.com | +| spiderip | https://spiderip.com | +| standingtech | https://portscanner.standingtech.com | +| viewdns | https://viewdns.info | +| yougetsignal | https://www.yougetsignal.com | ++----------------+--------------------------------------+ + +$ scanless -t scanme.nmap.org -s spiderip +Running scanless v2.1.6... + +spiderip: +PORT STATE SERVICE +21/tcp closed ftp +22/tcp open ssh +25/tcp closed smtp +80/tcp open http +110/tcp closed pop3 +143/tcp closed imap +443/tcp closed https +465/tcp closed smtps +993/tcp closed imaps +995/tcp closed pop3s +1433/tcp closed ms-sql-s +3306/tcp closed mysql +3389/tcp closed ms-wbt-server +5900/tcp closed vnc +8080/tcp closed http-proxy +8443/tcp closed https-alt +``` + +## Library Usage + +``` +>>> import scanless +>>> sl = scanless.Scanless() +>>> output = sl.scan('scanme.nmap.org', scanner='hackertarget') +>>> print(output['raw']) +Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC +Nmap scan report for scanme.nmap.org (45.33.32.156) +Host is up (0.065s latency). +Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f + +PORT STATE SERVICE +21/tcp closed ftp +22/tcp open ssh +80/tcp open http +443/tcp closed https + +Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds +>>> import json +>>> print(json.dumps(output['parsed'], indent=2)) +[ + { + "port": "21", + "state": "closed", + "service": "ftp", + "protocol": "tcp" + }, + { + "port": "22", + "state": "open", + "service": "ssh", + "protocol": "tcp" + }, + { + "port": "80", + "state": "open", + "service": "http", + "protocol": "tcp" + }, + { + "port": "443", + "state": "closed", + "service": "https", + "protocol": "tcp" + } +] +``` + + + + +%prep +%autosetup -n scanless-2.1.6 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-scanless -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Thu Mar 09 2023 Python_Bot <Python_Bot@openeuler.org> - 2.1.6-1 +- Package Spec generated @@ -0,0 +1 @@ +03c6a26e7f49472823713ab936e81023 scanless-2.1.6.tar.gz |