From e5d2517df88cf107ee6a8e6a2e721525a45bfba4 Mon Sep 17 00:00:00 2001 From: CoprDistGit Date: Thu, 18 May 2023 04:08:31 +0000 Subject: automatic import of python-webeye --- .gitignore | 1 + python-webeye.spec | 415 +++++++++++++++++++++++++++++++++++++++++++++++++++++ sources | 1 + 3 files changed, 417 insertions(+) create mode 100644 python-webeye.spec create mode 100644 sources diff --git a/.gitignore b/.gitignore index e69de29..676798f 100644 --- a/.gitignore +++ b/.gitignore @@ -0,0 +1 @@ +/webeye-2.3.12.tar.gz diff --git a/python-webeye.spec b/python-webeye.spec new file mode 100644 index 0000000..d778821 --- /dev/null +++ b/python-webeye.spec @@ -0,0 +1,415 @@ +%global _empty_manifest_terminate_build 0 +Name: python-webeye +Version: 2.3.12 +Release: 1 +Summary: A Best Powerful module for making ethical hacking tools easier +License: MIT +URL: https://github.com/Zaeem20/webeye +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/8a/ce/b6c3fb2a4a8f88dc74d3d6ec90ab539f07837e2c01bb75485e07b05390f6/webeye-2.3.12.tar.gz +BuildArch: noarch + +Requires: python3-requests +Requires: python3-httpx +Requires: python3-mechanize +Requires: python3-beautifulsoup4 + +%description +# Webeye +A Powerful Library for making ethical-hacking/pen-testing tools
+At your Fingertips, just in 3-5 lines of code... + +## Features + +• Subdomain Enumerator
+• Port scanner
+• ReverseDNS Lookup
+• ReversIP Lookup
+• Banner Grabber
+• Firewall Detector
+• Honeypot Detector (Based on Honeyscore)
+• Pagelinks Extractor
+• Shared DNS Scanner
+• DNS Lookup
+• Whois Lookup
+• Geo-IP Lookup
+• SiteDown detector
+• ROT encoder & decoder from (ROT-1 - ROT-25)
+ +## Installation +```sh +pip install -U webeye +``` +## Getting Started +```py +# importing +from webeye import * +# host +host="google.com" +# schema +schema="https://" +# subdomains +subdomains=subenum(host=host) +# dns lookup +dns=fetch_dns(host=host) +# banner grabber +grabbed=grab(host=host,schema=schema) +# check for ports +ports=scan(host=host, port=1025, start=0, dev_mode = False) +# cloudflare +detected=enumerate_waf(host=host) +# honeypot +honeypot=is_honeypot(host=host) + +``` + +## Custom Things +You can also scan specific ports, Iterable type args can also be added...
+ +```py +webeye.scan('google.com', [21,80,443]) + +``` + +You can get IP address of subdomain too... + +```py +print(webeye.subenum(target, no_ip=False)) + +``` +## Webeye as Asynchronous + +```py +from webeye import AsyncHelper + +asyncmanner = AsyncHelper() + +async def portscan(target): + await asyncmanner.scan(target, 1024) + +async def reversedns(target): + await asyncmanner.reversedns(target) + +async def whois(target): + await asyncmanner.whois(target) + +async def extract_pagelink(target): + await asyncmanner.extract_pagelink(target) + +async def shared_dns(target): + await asyncmanner.fetch_shared_dns(target) + +async def bannergrabber(target): + await asyncmanner.grab(target) + +async def geoip(target): + await asyncmanner.geoip(target) + +async def find_subdomains(target): + await asyncmanner.find_subdomains(target) + +async def dnslook(target): + await asyncmanner.fetch_dns(target) + +async def reversiplook(target): + await asyncmanner.reverseip(target) + +async def enumeratefirewall(target): + await asyncmanner.enumerate_firewall(target) + +async def is_honeypot(target): + await asyncmanner.is_honeypot(target) + +``` + +## Webeye as CLI + +![image](https://user-images.githubusercontent.com/60778335/137212470-c0326195-5fc5-4112-8587-1dbb09e3c0b9.png) + +## Support +• **[Discord](https://discord.gg/xmu36SbCXC)** + + +%package -n python3-webeye +Summary: A Best Powerful module for making ethical hacking tools easier +Provides: python-webeye +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-webeye +# Webeye +A Powerful Library for making ethical-hacking/pen-testing tools
+At your Fingertips, just in 3-5 lines of code... + +## Features + +• Subdomain Enumerator
+• Port scanner
+• ReverseDNS Lookup
+• ReversIP Lookup
+• Banner Grabber
+• Firewall Detector
+• Honeypot Detector (Based on Honeyscore)
+• Pagelinks Extractor
+• Shared DNS Scanner
+• DNS Lookup
+• Whois Lookup
+• Geo-IP Lookup
+• SiteDown detector
+• ROT encoder & decoder from (ROT-1 - ROT-25)
+ +## Installation +```sh +pip install -U webeye +``` +## Getting Started +```py +# importing +from webeye import * +# host +host="google.com" +# schema +schema="https://" +# subdomains +subdomains=subenum(host=host) +# dns lookup +dns=fetch_dns(host=host) +# banner grabber +grabbed=grab(host=host,schema=schema) +# check for ports +ports=scan(host=host, port=1025, start=0, dev_mode = False) +# cloudflare +detected=enumerate_waf(host=host) +# honeypot +honeypot=is_honeypot(host=host) + +``` + +## Custom Things +You can also scan specific ports, Iterable type args can also be added...
+ +```py +webeye.scan('google.com', [21,80,443]) + +``` + +You can get IP address of subdomain too... + +```py +print(webeye.subenum(target, no_ip=False)) + +``` +## Webeye as Asynchronous + +```py +from webeye import AsyncHelper + +asyncmanner = AsyncHelper() + +async def portscan(target): + await asyncmanner.scan(target, 1024) + +async def reversedns(target): + await asyncmanner.reversedns(target) + +async def whois(target): + await asyncmanner.whois(target) + +async def extract_pagelink(target): + await asyncmanner.extract_pagelink(target) + +async def shared_dns(target): + await asyncmanner.fetch_shared_dns(target) + +async def bannergrabber(target): + await asyncmanner.grab(target) + +async def geoip(target): + await asyncmanner.geoip(target) + +async def find_subdomains(target): + await asyncmanner.find_subdomains(target) + +async def dnslook(target): + await asyncmanner.fetch_dns(target) + +async def reversiplook(target): + await asyncmanner.reverseip(target) + +async def enumeratefirewall(target): + await asyncmanner.enumerate_firewall(target) + +async def is_honeypot(target): + await asyncmanner.is_honeypot(target) + +``` + +## Webeye as CLI + +![image](https://user-images.githubusercontent.com/60778335/137212470-c0326195-5fc5-4112-8587-1dbb09e3c0b9.png) + +## Support +• **[Discord](https://discord.gg/xmu36SbCXC)** + + +%package help +Summary: Development documents and examples for webeye +Provides: python3-webeye-doc +%description help +# Webeye +A Powerful Library for making ethical-hacking/pen-testing tools
+At your Fingertips, just in 3-5 lines of code... + +## Features + +• Subdomain Enumerator
+• Port scanner
+• ReverseDNS Lookup
+• ReversIP Lookup
+• Banner Grabber
+• Firewall Detector
+• Honeypot Detector (Based on Honeyscore)
+• Pagelinks Extractor
+• Shared DNS Scanner
+• DNS Lookup
+• Whois Lookup
+• Geo-IP Lookup
+• SiteDown detector
+• ROT encoder & decoder from (ROT-1 - ROT-25)
+ +## Installation +```sh +pip install -U webeye +``` +## Getting Started +```py +# importing +from webeye import * +# host +host="google.com" +# schema +schema="https://" +# subdomains +subdomains=subenum(host=host) +# dns lookup +dns=fetch_dns(host=host) +# banner grabber +grabbed=grab(host=host,schema=schema) +# check for ports +ports=scan(host=host, port=1025, start=0, dev_mode = False) +# cloudflare +detected=enumerate_waf(host=host) +# honeypot +honeypot=is_honeypot(host=host) + +``` + +## Custom Things +You can also scan specific ports, Iterable type args can also be added...
+ +```py +webeye.scan('google.com', [21,80,443]) + +``` + +You can get IP address of subdomain too... + +```py +print(webeye.subenum(target, no_ip=False)) + +``` +## Webeye as Asynchronous + +```py +from webeye import AsyncHelper + +asyncmanner = AsyncHelper() + +async def portscan(target): + await asyncmanner.scan(target, 1024) + +async def reversedns(target): + await asyncmanner.reversedns(target) + +async def whois(target): + await asyncmanner.whois(target) + +async def extract_pagelink(target): + await asyncmanner.extract_pagelink(target) + +async def shared_dns(target): + await asyncmanner.fetch_shared_dns(target) + +async def bannergrabber(target): + await asyncmanner.grab(target) + +async def geoip(target): + await asyncmanner.geoip(target) + +async def find_subdomains(target): + await asyncmanner.find_subdomains(target) + +async def dnslook(target): + await asyncmanner.fetch_dns(target) + +async def reversiplook(target): + await asyncmanner.reverseip(target) + +async def enumeratefirewall(target): + await asyncmanner.enumerate_firewall(target) + +async def is_honeypot(target): + await asyncmanner.is_honeypot(target) + +``` + +## Webeye as CLI + +![image](https://user-images.githubusercontent.com/60778335/137212470-c0326195-5fc5-4112-8587-1dbb09e3c0b9.png) + +## Support +• **[Discord](https://discord.gg/xmu36SbCXC)** + + +%prep +%autosetup -n webeye-2.3.12 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-webeye -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Thu May 18 2023 Python_Bot - 2.3.12-1 +- Package Spec generated diff --git a/sources b/sources new file mode 100644 index 0000000..c4f8560 --- /dev/null +++ b/sources @@ -0,0 +1 @@ +bff45e1407e45d1846c473feaa3b7432 webeye-2.3.12.tar.gz -- cgit v1.2.3