summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2023-03-09 16:41:32 +0000
committerCoprDistGit <infra@openeuler.org>2023-03-09 16:41:32 +0000
commit8329d9506636dd1eb2b9aa3a23b323e78cdab719 (patch)
treee8b9231aca06c896adb935e6b51d1185873fd029
parentf48e69abbd5989ba377ca855479f46ec45989c69 (diff)
automatic import of python-scanless
-rw-r--r--.gitignore1
-rw-r--r--python-scanless.spec447
-rw-r--r--sources1
3 files changed, 449 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
index e69de29..fb1d863 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/scanless-2.1.6.tar.gz
diff --git a/python-scanless.spec b/python-scanless.spec
new file mode 100644
index 0000000..68c5e1e
--- /dev/null
+++ b/python-scanless.spec
@@ -0,0 +1,447 @@
+%global _empty_manifest_terminate_build 0
+Name: python-scanless
+Version: 2.1.6
+Release: 1
+Summary: An online port scan scraper.
+License: Unlicense
+URL: https://github.com/vesche/scanless
+Source0: https://mirrors.nju.edu.cn/pypi/web/packages/44/0c/a397efb5777d22b49e92e009bc5907c96ac845ffa57d43e3356779c1954f/scanless-2.1.6.tar.gz
+BuildArch: noarch
+
+
+%description
+# scanless
+
+This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf.
+
+## Supported Online Port Scanners
+
+* [hackertarget](https://hackertarget.com/nmap-online-port-scanner/)
+* [ipfingerprints](http://www.ipfingerprints.com/portscan.php)
+* [spiderip](https://spiderip.com/online-port-scan.php)
+* [standingtech](https://portscanner.standingtech.com/)
+* [viewdns](http://viewdns.info/)
+* [yougetsignal](http://www.yougetsignal.com/tools/open-ports/)
+
+## Install
+
+Do it up:
+```
+$ pip install scanless --user
+```
+
+## CLI Usage
+
+```
+$ scanless --help
+usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a]
+
+scanless, an online port scan scraper.
+
+optional arguments:
+ -h, --help show this help message and exit
+ -v, --version display the current version
+ -t TARGET, --target TARGET
+ ip or domain to scan
+ -s SCANNER, --scanner SCANNER
+ scanner to use (default: hackertarget)
+ -r, --random use a random scanner
+ -l, --list list scanners
+ -a, --all use all the scanners
+ -d, --debug debug mode (cli mode off & show network errors)
+
+$ scanless --list
++----------------+--------------------------------------+
+| Scanner Name | Website |
++----------------+--------------------------------------+
+| hackertarget | https://hackertarget.com |
+| ipfingerprints | https://www.ipfingerprints.com |
+| spiderip | https://spiderip.com |
+| standingtech | https://portscanner.standingtech.com |
+| viewdns | https://viewdns.info |
+| yougetsignal | https://www.yougetsignal.com |
++----------------+--------------------------------------+
+
+$ scanless -t scanme.nmap.org -s spiderip
+Running scanless v2.1.6...
+
+spiderip:
+PORT STATE SERVICE
+21/tcp closed ftp
+22/tcp open ssh
+25/tcp closed smtp
+80/tcp open http
+110/tcp closed pop3
+143/tcp closed imap
+443/tcp closed https
+465/tcp closed smtps
+993/tcp closed imaps
+995/tcp closed pop3s
+1433/tcp closed ms-sql-s
+3306/tcp closed mysql
+3389/tcp closed ms-wbt-server
+5900/tcp closed vnc
+8080/tcp closed http-proxy
+8443/tcp closed https-alt
+```
+
+## Library Usage
+
+```
+>>> import scanless
+>>> sl = scanless.Scanless()
+>>> output = sl.scan('scanme.nmap.org', scanner='hackertarget')
+>>> print(output['raw'])
+Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC
+Nmap scan report for scanme.nmap.org (45.33.32.156)
+Host is up (0.065s latency).
+Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
+
+PORT STATE SERVICE
+21/tcp closed ftp
+22/tcp open ssh
+80/tcp open http
+443/tcp closed https
+
+Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
+>>> import json
+>>> print(json.dumps(output['parsed'], indent=2))
+[
+ {
+ "port": "21",
+ "state": "closed",
+ "service": "ftp",
+ "protocol": "tcp"
+ },
+ {
+ "port": "22",
+ "state": "open",
+ "service": "ssh",
+ "protocol": "tcp"
+ },
+ {
+ "port": "80",
+ "state": "open",
+ "service": "http",
+ "protocol": "tcp"
+ },
+ {
+ "port": "443",
+ "state": "closed",
+ "service": "https",
+ "protocol": "tcp"
+ }
+]
+```
+
+
+
+
+%package -n python3-scanless
+Summary: An online port scan scraper.
+Provides: python-scanless
+BuildRequires: python3-devel
+BuildRequires: python3-setuptools
+BuildRequires: python3-pip
+%description -n python3-scanless
+# scanless
+
+This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf.
+
+## Supported Online Port Scanners
+
+* [hackertarget](https://hackertarget.com/nmap-online-port-scanner/)
+* [ipfingerprints](http://www.ipfingerprints.com/portscan.php)
+* [spiderip](https://spiderip.com/online-port-scan.php)
+* [standingtech](https://portscanner.standingtech.com/)
+* [viewdns](http://viewdns.info/)
+* [yougetsignal](http://www.yougetsignal.com/tools/open-ports/)
+
+## Install
+
+Do it up:
+```
+$ pip install scanless --user
+```
+
+## CLI Usage
+
+```
+$ scanless --help
+usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a]
+
+scanless, an online port scan scraper.
+
+optional arguments:
+ -h, --help show this help message and exit
+ -v, --version display the current version
+ -t TARGET, --target TARGET
+ ip or domain to scan
+ -s SCANNER, --scanner SCANNER
+ scanner to use (default: hackertarget)
+ -r, --random use a random scanner
+ -l, --list list scanners
+ -a, --all use all the scanners
+ -d, --debug debug mode (cli mode off & show network errors)
+
+$ scanless --list
++----------------+--------------------------------------+
+| Scanner Name | Website |
++----------------+--------------------------------------+
+| hackertarget | https://hackertarget.com |
+| ipfingerprints | https://www.ipfingerprints.com |
+| spiderip | https://spiderip.com |
+| standingtech | https://portscanner.standingtech.com |
+| viewdns | https://viewdns.info |
+| yougetsignal | https://www.yougetsignal.com |
++----------------+--------------------------------------+
+
+$ scanless -t scanme.nmap.org -s spiderip
+Running scanless v2.1.6...
+
+spiderip:
+PORT STATE SERVICE
+21/tcp closed ftp
+22/tcp open ssh
+25/tcp closed smtp
+80/tcp open http
+110/tcp closed pop3
+143/tcp closed imap
+443/tcp closed https
+465/tcp closed smtps
+993/tcp closed imaps
+995/tcp closed pop3s
+1433/tcp closed ms-sql-s
+3306/tcp closed mysql
+3389/tcp closed ms-wbt-server
+5900/tcp closed vnc
+8080/tcp closed http-proxy
+8443/tcp closed https-alt
+```
+
+## Library Usage
+
+```
+>>> import scanless
+>>> sl = scanless.Scanless()
+>>> output = sl.scan('scanme.nmap.org', scanner='hackertarget')
+>>> print(output['raw'])
+Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC
+Nmap scan report for scanme.nmap.org (45.33.32.156)
+Host is up (0.065s latency).
+Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
+
+PORT STATE SERVICE
+21/tcp closed ftp
+22/tcp open ssh
+80/tcp open http
+443/tcp closed https
+
+Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
+>>> import json
+>>> print(json.dumps(output['parsed'], indent=2))
+[
+ {
+ "port": "21",
+ "state": "closed",
+ "service": "ftp",
+ "protocol": "tcp"
+ },
+ {
+ "port": "22",
+ "state": "open",
+ "service": "ssh",
+ "protocol": "tcp"
+ },
+ {
+ "port": "80",
+ "state": "open",
+ "service": "http",
+ "protocol": "tcp"
+ },
+ {
+ "port": "443",
+ "state": "closed",
+ "service": "https",
+ "protocol": "tcp"
+ }
+]
+```
+
+
+
+
+%package help
+Summary: Development documents and examples for scanless
+Provides: python3-scanless-doc
+%description help
+# scanless
+
+This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf.
+
+## Supported Online Port Scanners
+
+* [hackertarget](https://hackertarget.com/nmap-online-port-scanner/)
+* [ipfingerprints](http://www.ipfingerprints.com/portscan.php)
+* [spiderip](https://spiderip.com/online-port-scan.php)
+* [standingtech](https://portscanner.standingtech.com/)
+* [viewdns](http://viewdns.info/)
+* [yougetsignal](http://www.yougetsignal.com/tools/open-ports/)
+
+## Install
+
+Do it up:
+```
+$ pip install scanless --user
+```
+
+## CLI Usage
+
+```
+$ scanless --help
+usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a]
+
+scanless, an online port scan scraper.
+
+optional arguments:
+ -h, --help show this help message and exit
+ -v, --version display the current version
+ -t TARGET, --target TARGET
+ ip or domain to scan
+ -s SCANNER, --scanner SCANNER
+ scanner to use (default: hackertarget)
+ -r, --random use a random scanner
+ -l, --list list scanners
+ -a, --all use all the scanners
+ -d, --debug debug mode (cli mode off & show network errors)
+
+$ scanless --list
++----------------+--------------------------------------+
+| Scanner Name | Website |
++----------------+--------------------------------------+
+| hackertarget | https://hackertarget.com |
+| ipfingerprints | https://www.ipfingerprints.com |
+| spiderip | https://spiderip.com |
+| standingtech | https://portscanner.standingtech.com |
+| viewdns | https://viewdns.info |
+| yougetsignal | https://www.yougetsignal.com |
++----------------+--------------------------------------+
+
+$ scanless -t scanme.nmap.org -s spiderip
+Running scanless v2.1.6...
+
+spiderip:
+PORT STATE SERVICE
+21/tcp closed ftp
+22/tcp open ssh
+25/tcp closed smtp
+80/tcp open http
+110/tcp closed pop3
+143/tcp closed imap
+443/tcp closed https
+465/tcp closed smtps
+993/tcp closed imaps
+995/tcp closed pop3s
+1433/tcp closed ms-sql-s
+3306/tcp closed mysql
+3389/tcp closed ms-wbt-server
+5900/tcp closed vnc
+8080/tcp closed http-proxy
+8443/tcp closed https-alt
+```
+
+## Library Usage
+
+```
+>>> import scanless
+>>> sl = scanless.Scanless()
+>>> output = sl.scan('scanme.nmap.org', scanner='hackertarget')
+>>> print(output['raw'])
+Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC
+Nmap scan report for scanme.nmap.org (45.33.32.156)
+Host is up (0.065s latency).
+Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
+
+PORT STATE SERVICE
+21/tcp closed ftp
+22/tcp open ssh
+80/tcp open http
+443/tcp closed https
+
+Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
+>>> import json
+>>> print(json.dumps(output['parsed'], indent=2))
+[
+ {
+ "port": "21",
+ "state": "closed",
+ "service": "ftp",
+ "protocol": "tcp"
+ },
+ {
+ "port": "22",
+ "state": "open",
+ "service": "ssh",
+ "protocol": "tcp"
+ },
+ {
+ "port": "80",
+ "state": "open",
+ "service": "http",
+ "protocol": "tcp"
+ },
+ {
+ "port": "443",
+ "state": "closed",
+ "service": "https",
+ "protocol": "tcp"
+ }
+]
+```
+
+
+
+
+%prep
+%autosetup -n scanless-2.1.6
+
+%build
+%py3_build
+
+%install
+%py3_install
+install -d -m755 %{buildroot}/%{_pkgdocdir}
+if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
+if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
+if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
+if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
+pushd %{buildroot}
+if [ -d usr/lib ]; then
+ find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/lib64 ]; then
+ find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/bin ]; then
+ find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/sbin ]; then
+ find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+touch doclist.lst
+if [ -d usr/share/man ]; then
+ find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst
+fi
+popd
+mv %{buildroot}/filelist.lst .
+mv %{buildroot}/doclist.lst .
+
+%files -n python3-scanless -f filelist.lst
+%dir %{python3_sitelib}/*
+
+%files help -f doclist.lst
+%{_docdir}/*
+
+%changelog
+* Thu Mar 09 2023 Python_Bot <Python_Bot@openeuler.org> - 2.1.6-1
+- Package Spec generated
diff --git a/sources b/sources
new file mode 100644
index 0000000..ef04d63
--- /dev/null
+++ b/sources
@@ -0,0 +1 @@
+03c6a26e7f49472823713ab936e81023 scanless-2.1.6.tar.gz