diff options
-rw-r--r-- | .gitignore | 1 | ||||
-rw-r--r-- | python-wfuzz.spec | 240 | ||||
-rw-r--r-- | sources | 1 |
3 files changed, 242 insertions, 0 deletions
@@ -0,0 +1 @@ +/wfuzz-3.1.0.tar.gz diff --git a/python-wfuzz.spec b/python-wfuzz.spec new file mode 100644 index 0000000..da62adb --- /dev/null +++ b/python-wfuzz.spec @@ -0,0 +1,240 @@ +%global _empty_manifest_terminate_build 0 +Name: python-wfuzz +Version: 3.1.0 +Release: 1 +Summary: Wfuzz - The web fuzzer +License: GPLv2 +URL: http://wfuzz.org +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/c8/67/25c12b13cc63d2741fb64487c92d3ed98bac0646cf954c888ad66e88ecec/wfuzz-3.1.0.tar.gz +BuildArch: noarch + +Requires: python3-pycurl +Requires: python3-six +Requires: python3-chardet +Requires: python3-configparser +Requires: python3-pyparsing +Requires: python3-pyparsing +Requires: python3-mock +Requires: python3-coverage +Requires: python3-codecov +Requires: python3-netaddr +Requires: python3-pip-tools +Requires: python3-flake8 +Requires: python3-pytest +Requires: python3-black +Requires: python3-Sphinx + +%description +<img src="https://github.com/xmendez/wfuzz/blob/master/docs/_static/logo/wfuzz_letters.svg" width="500"> + +[](https://travis-ci.org/xmendez/wfuzz) +<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/v/wfuzz.svg"></a> +<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/dm/wfuzz"></a> +<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/pyversions/wfuzz.svg"></a> +<a href="https://codecov.io/github/xmendez/wfuzz"><img src="https://codecov.io/github/xmendez/wfuzz/coverage.svg?branch=master"></a> + + +# Wfuzz - The Web Fuzzer + +Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload. + +A payload in Wfuzz is a source of data. + +This simple concept allows any input to be injected in any field of an HTTP request, allowing to perform complex web security attacks in different web application components such as: parameters, authentication, forms, directories/files, headers, etc. + +Wfuzz is more than a web content scanner: + +* Wfuzz could help you to secure your web applications by finding and exploiting web application vulnerabilities. Wfuzz’s web application vulnerability scanner is supported by plugins. + +* Wfuzz is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Building plugins is simple and takes little more than a few minutes. + +* Wfuzz exposes a simple language interface to the previous HTTP requests/responses performed using Wfuzz or other tools, such as Burp. This allows you to perform manual and semi-automatic tests with full context and understanding of your actions, without relying on a web application scanner underlying implementation. + + +It was created to facilitate the task in web applications assessments, it's a tool by pentesters for pentesters ;) + +## Installation + +To install WFuzz, simply use pip: + +``` +pip install wfuzz +``` + +To run Wfuzz from a docker image, run: + +``` +$ docker run -v $(pwd)/wordlist:/wordlist/ -it ghcr.io/xmendez/wfuzz wfuzz +``` + +## Documentation + +Documentation is available at http://wfuzz.readthedocs.io + +## Download + +Check github releases. Latest is available at https://github.com/xmendez/wfuzz/releases/latest + + + + +%package -n python3-wfuzz +Summary: Wfuzz - The web fuzzer +Provides: python-wfuzz +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-wfuzz +<img src="https://github.com/xmendez/wfuzz/blob/master/docs/_static/logo/wfuzz_letters.svg" width="500"> + +[](https://travis-ci.org/xmendez/wfuzz) +<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/v/wfuzz.svg"></a> +<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/dm/wfuzz"></a> +<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/pyversions/wfuzz.svg"></a> +<a href="https://codecov.io/github/xmendez/wfuzz"><img src="https://codecov.io/github/xmendez/wfuzz/coverage.svg?branch=master"></a> + + +# Wfuzz - The Web Fuzzer + +Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload. + +A payload in Wfuzz is a source of data. + +This simple concept allows any input to be injected in any field of an HTTP request, allowing to perform complex web security attacks in different web application components such as: parameters, authentication, forms, directories/files, headers, etc. + +Wfuzz is more than a web content scanner: + +* Wfuzz could help you to secure your web applications by finding and exploiting web application vulnerabilities. Wfuzz’s web application vulnerability scanner is supported by plugins. + +* Wfuzz is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Building plugins is simple and takes little more than a few minutes. + +* Wfuzz exposes a simple language interface to the previous HTTP requests/responses performed using Wfuzz or other tools, such as Burp. This allows you to perform manual and semi-automatic tests with full context and understanding of your actions, without relying on a web application scanner underlying implementation. + + +It was created to facilitate the task in web applications assessments, it's a tool by pentesters for pentesters ;) + +## Installation + +To install WFuzz, simply use pip: + +``` +pip install wfuzz +``` + +To run Wfuzz from a docker image, run: + +``` +$ docker run -v $(pwd)/wordlist:/wordlist/ -it ghcr.io/xmendez/wfuzz wfuzz +``` + +## Documentation + +Documentation is available at http://wfuzz.readthedocs.io + +## Download + +Check github releases. Latest is available at https://github.com/xmendez/wfuzz/releases/latest + + + + +%package help +Summary: Development documents and examples for wfuzz +Provides: python3-wfuzz-doc +%description help +<img src="https://github.com/xmendez/wfuzz/blob/master/docs/_static/logo/wfuzz_letters.svg" width="500"> + +[](https://travis-ci.org/xmendez/wfuzz) +<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/v/wfuzz.svg"></a> +<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/dm/wfuzz"></a> +<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/pyversions/wfuzz.svg"></a> +<a href="https://codecov.io/github/xmendez/wfuzz"><img src="https://codecov.io/github/xmendez/wfuzz/coverage.svg?branch=master"></a> + + +# Wfuzz - The Web Fuzzer + +Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload. + +A payload in Wfuzz is a source of data. + +This simple concept allows any input to be injected in any field of an HTTP request, allowing to perform complex web security attacks in different web application components such as: parameters, authentication, forms, directories/files, headers, etc. + +Wfuzz is more than a web content scanner: + +* Wfuzz could help you to secure your web applications by finding and exploiting web application vulnerabilities. Wfuzz’s web application vulnerability scanner is supported by plugins. + +* Wfuzz is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Building plugins is simple and takes little more than a few minutes. + +* Wfuzz exposes a simple language interface to the previous HTTP requests/responses performed using Wfuzz or other tools, such as Burp. This allows you to perform manual and semi-automatic tests with full context and understanding of your actions, without relying on a web application scanner underlying implementation. + + +It was created to facilitate the task in web applications assessments, it's a tool by pentesters for pentesters ;) + +## Installation + +To install WFuzz, simply use pip: + +``` +pip install wfuzz +``` + +To run Wfuzz from a docker image, run: + +``` +$ docker run -v $(pwd)/wordlist:/wordlist/ -it ghcr.io/xmendez/wfuzz wfuzz +``` + +## Documentation + +Documentation is available at http://wfuzz.readthedocs.io + +## Download + +Check github releases. Latest is available at https://github.com/xmendez/wfuzz/releases/latest + + + + +%prep +%autosetup -n wfuzz-3.1.0 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-wfuzz -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Tue Apr 11 2023 Python_Bot <Python_Bot@openeuler.org> - 3.1.0-1 +- Package Spec generated @@ -0,0 +1 @@ +f917b65f3a92cce5e21d254209e4bc9a wfuzz-3.1.0.tar.gz |