summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--.gitignore1
-rw-r--r--python-wfuzz.spec240
-rw-r--r--sources1
3 files changed, 242 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
index e69de29..1837498 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/wfuzz-3.1.0.tar.gz
diff --git a/python-wfuzz.spec b/python-wfuzz.spec
new file mode 100644
index 0000000..da62adb
--- /dev/null
+++ b/python-wfuzz.spec
@@ -0,0 +1,240 @@
+%global _empty_manifest_terminate_build 0
+Name: python-wfuzz
+Version: 3.1.0
+Release: 1
+Summary: Wfuzz - The web fuzzer
+License: GPLv2
+URL: http://wfuzz.org
+Source0: https://mirrors.nju.edu.cn/pypi/web/packages/c8/67/25c12b13cc63d2741fb64487c92d3ed98bac0646cf954c888ad66e88ecec/wfuzz-3.1.0.tar.gz
+BuildArch: noarch
+
+Requires: python3-pycurl
+Requires: python3-six
+Requires: python3-chardet
+Requires: python3-configparser
+Requires: python3-pyparsing
+Requires: python3-pyparsing
+Requires: python3-mock
+Requires: python3-coverage
+Requires: python3-codecov
+Requires: python3-netaddr
+Requires: python3-pip-tools
+Requires: python3-flake8
+Requires: python3-pytest
+Requires: python3-black
+Requires: python3-Sphinx
+
+%description
+<img src="https://github.com/xmendez/wfuzz/blob/master/docs/_static/logo/wfuzz_letters.svg" width="500">
+
+[![Build Status](https://travis-ci.org/xmendez/wfuzz.svg?branch=master)](https://travis-ci.org/xmendez/wfuzz)
+<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/v/wfuzz.svg"></a>
+<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/dm/wfuzz"></a>
+<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/pyversions/wfuzz.svg"></a>
+<a href="https://codecov.io/github/xmendez/wfuzz"><img src="https://codecov.io/github/xmendez/wfuzz/coverage.svg?branch=master"></a>
+
+
+# Wfuzz - The Web Fuzzer
+
+Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload.
+
+A payload in Wfuzz is a source of data.
+
+This simple concept allows any input to be injected in any field of an HTTP request, allowing to perform complex web security attacks in different web application components such as: parameters, authentication, forms, directories/files, headers, etc.
+
+Wfuzz is more than a web content scanner:
+
+* Wfuzz could help you to secure your web applications by finding and exploiting web application vulnerabilities. Wfuzz’s web application vulnerability scanner is supported by plugins.
+
+* Wfuzz is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Building plugins is simple and takes little more than a few minutes.
+
+* Wfuzz exposes a simple language interface to the previous HTTP requests/responses performed using Wfuzz or other tools, such as Burp. This allows you to perform manual and semi-automatic tests with full context and understanding of your actions, without relying on a web application scanner underlying implementation.
+
+
+It was created to facilitate the task in web applications assessments, it's a tool by pentesters for pentesters ;)
+
+## Installation
+
+To install WFuzz, simply use pip:
+
+```
+pip install wfuzz
+```
+
+To run Wfuzz from a docker image, run:
+
+```
+$ docker run -v $(pwd)/wordlist:/wordlist/ -it ghcr.io/xmendez/wfuzz wfuzz
+```
+
+## Documentation
+
+Documentation is available at http://wfuzz.readthedocs.io
+
+## Download
+
+Check github releases. Latest is available at https://github.com/xmendez/wfuzz/releases/latest
+
+
+
+
+%package -n python3-wfuzz
+Summary: Wfuzz - The web fuzzer
+Provides: python-wfuzz
+BuildRequires: python3-devel
+BuildRequires: python3-setuptools
+BuildRequires: python3-pip
+%description -n python3-wfuzz
+<img src="https://github.com/xmendez/wfuzz/blob/master/docs/_static/logo/wfuzz_letters.svg" width="500">
+
+[![Build Status](https://travis-ci.org/xmendez/wfuzz.svg?branch=master)](https://travis-ci.org/xmendez/wfuzz)
+<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/v/wfuzz.svg"></a>
+<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/dm/wfuzz"></a>
+<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/pyversions/wfuzz.svg"></a>
+<a href="https://codecov.io/github/xmendez/wfuzz"><img src="https://codecov.io/github/xmendez/wfuzz/coverage.svg?branch=master"></a>
+
+
+# Wfuzz - The Web Fuzzer
+
+Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload.
+
+A payload in Wfuzz is a source of data.
+
+This simple concept allows any input to be injected in any field of an HTTP request, allowing to perform complex web security attacks in different web application components such as: parameters, authentication, forms, directories/files, headers, etc.
+
+Wfuzz is more than a web content scanner:
+
+* Wfuzz could help you to secure your web applications by finding and exploiting web application vulnerabilities. Wfuzz’s web application vulnerability scanner is supported by plugins.
+
+* Wfuzz is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Building plugins is simple and takes little more than a few minutes.
+
+* Wfuzz exposes a simple language interface to the previous HTTP requests/responses performed using Wfuzz or other tools, such as Burp. This allows you to perform manual and semi-automatic tests with full context and understanding of your actions, without relying on a web application scanner underlying implementation.
+
+
+It was created to facilitate the task in web applications assessments, it's a tool by pentesters for pentesters ;)
+
+## Installation
+
+To install WFuzz, simply use pip:
+
+```
+pip install wfuzz
+```
+
+To run Wfuzz from a docker image, run:
+
+```
+$ docker run -v $(pwd)/wordlist:/wordlist/ -it ghcr.io/xmendez/wfuzz wfuzz
+```
+
+## Documentation
+
+Documentation is available at http://wfuzz.readthedocs.io
+
+## Download
+
+Check github releases. Latest is available at https://github.com/xmendez/wfuzz/releases/latest
+
+
+
+
+%package help
+Summary: Development documents and examples for wfuzz
+Provides: python3-wfuzz-doc
+%description help
+<img src="https://github.com/xmendez/wfuzz/blob/master/docs/_static/logo/wfuzz_letters.svg" width="500">
+
+[![Build Status](https://travis-ci.org/xmendez/wfuzz.svg?branch=master)](https://travis-ci.org/xmendez/wfuzz)
+<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/v/wfuzz.svg"></a>
+<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/dm/wfuzz"></a>
+<a href="https://pypi.python.org/pypi/wfuzz"><img src="https://img.shields.io/pypi/pyversions/wfuzz.svg"></a>
+<a href="https://codecov.io/github/xmendez/wfuzz"><img src="https://codecov.io/github/xmendez/wfuzz/coverage.svg?branch=master"></a>
+
+
+# Wfuzz - The Web Fuzzer
+
+Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload.
+
+A payload in Wfuzz is a source of data.
+
+This simple concept allows any input to be injected in any field of an HTTP request, allowing to perform complex web security attacks in different web application components such as: parameters, authentication, forms, directories/files, headers, etc.
+
+Wfuzz is more than a web content scanner:
+
+* Wfuzz could help you to secure your web applications by finding and exploiting web application vulnerabilities. Wfuzz’s web application vulnerability scanner is supported by plugins.
+
+* Wfuzz is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Building plugins is simple and takes little more than a few minutes.
+
+* Wfuzz exposes a simple language interface to the previous HTTP requests/responses performed using Wfuzz or other tools, such as Burp. This allows you to perform manual and semi-automatic tests with full context and understanding of your actions, without relying on a web application scanner underlying implementation.
+
+
+It was created to facilitate the task in web applications assessments, it's a tool by pentesters for pentesters ;)
+
+## Installation
+
+To install WFuzz, simply use pip:
+
+```
+pip install wfuzz
+```
+
+To run Wfuzz from a docker image, run:
+
+```
+$ docker run -v $(pwd)/wordlist:/wordlist/ -it ghcr.io/xmendez/wfuzz wfuzz
+```
+
+## Documentation
+
+Documentation is available at http://wfuzz.readthedocs.io
+
+## Download
+
+Check github releases. Latest is available at https://github.com/xmendez/wfuzz/releases/latest
+
+
+
+
+%prep
+%autosetup -n wfuzz-3.1.0
+
+%build
+%py3_build
+
+%install
+%py3_install
+install -d -m755 %{buildroot}/%{_pkgdocdir}
+if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
+if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
+if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
+if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
+pushd %{buildroot}
+if [ -d usr/lib ]; then
+ find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/lib64 ]; then
+ find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/bin ]; then
+ find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/sbin ]; then
+ find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+touch doclist.lst
+if [ -d usr/share/man ]; then
+ find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst
+fi
+popd
+mv %{buildroot}/filelist.lst .
+mv %{buildroot}/doclist.lst .
+
+%files -n python3-wfuzz -f filelist.lst
+%dir %{python3_sitelib}/*
+
+%files help -f doclist.lst
+%{_docdir}/*
+
+%changelog
+* Tue Apr 11 2023 Python_Bot <Python_Bot@openeuler.org> - 3.1.0-1
+- Package Spec generated
diff --git a/sources b/sources
new file mode 100644
index 0000000..834bcba
--- /dev/null
+++ b/sources
@@ -0,0 +1 @@
+f917b65f3a92cce5e21d254209e4bc9a wfuzz-3.1.0.tar.gz