%global _empty_manifest_terminate_build 0 Name: python-scanless Version: 2.2.1 Release: 1 Summary: An online port scan scraper. License: Unlicense URL: https://github.com/vesche/scanless Source0: https://mirrors.nju.edu.cn/pypi/web/packages/50/d0/89d4922f4f6f0faa3be4f6ae455a13d049068ae45a83ec70cf795cd7ae06/scanless-2.2.1.tar.gz BuildArch: noarch %description # scanless This is a Python command-line utility and library for using websites that can perform port scans on your behalf. ## Supported Online Port Scanners * [ipfingerprints](http://www.ipfingerprints.com/portscan.php) * [spiderip](https://spiderip.com/online-port-scan.php) * [standingtech](https://portscanner.standingtech.com/) * [viewdns](http://viewdns.info/) * [yougetsignal](http://www.yougetsignal.com/tools/open-ports/) ## Install Do it up: ``` $ pip install scanless --user ``` ## CLI Usage ``` $ scanless --help usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] [-d] scanless, an online port scan scraper. options: -h, --help show this help message and exit -v, --version display the current version -t TARGET, --target TARGET ip or domain to scan -s SCANNER, --scanner SCANNER scanner to use (default: yougetsignal) -r, --random use a random scanner -l, --list list scanners -a, --all use all the scanners -d, --debug debug mode (cli mode off & show network errors) $ scanless --list +----------------+--------------------------------------+ | Scanner Name | Website | +----------------+--------------------------------------+ | ipfingerprints | https://www.ipfingerprints.com | | spiderip | https://spiderip.com | | standingtech | https://portscanner.standingtech.com | | viewdns | https://viewdns.info | | yougetsignal | https://www.yougetsignal.com | +----------------+--------------------------------------+ $ scanless -t scanme.nmap.org -s spiderip Running scanless v2.2.1 ... spiderip: PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 25/tcp closed smtp 80/tcp open http 110/tcp closed pop3 143/tcp closed imap 443/tcp closed https 465/tcp closed smtps 993/tcp closed imaps 995/tcp closed pop3s 1433/tcp closed ms-sql-s 3306/tcp closed mysql 3389/tcp closed ms-wbt-server 5900/tcp closed vnc 8080/tcp closed http-proxy 8443/tcp closed https-alt ``` ## Library Usage ``` >>> import scanless >>> sl = scanless.Scanless() >>> output = sl.scan('scanme.nmap.org', scanner='yougetsignal') >>> print(output['raw']) PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 23/tcp closed telnet 25/tcp closed smtp 53/tcp closed domain 80/tcp open http 110/tcp closed pop3 115/tcp closed sftp 135/tcp closed msrpc 139/tcp closed netbios-ssn 143/tcp closed imap 194/tcp closed irc 443/tcp closed https 445/tcp closed microsoft-ds 1433/tcp closed ms-sql-s 3306/tcp closed mysql 3389/tcp closed ms-wbt-server 5632/tcp closed pcanywherestat 5900/tcp closed vnc 6112/tcp closed dtspc >>> import json >>> print(json.dumps(output['parsed'], indent=2)) [ { "port": "21", "state": "closed", "service": "ftp", "protocol": "tcp" }, { "port": "22", "state": "open", "service": "ssh", "protocol": "tcp" }, { "port": "23", "state": "closed", "service": "telnet", "protocol": "tcp" }, { "port": "25", "state": "closed", "service": "smtp", "protocol": "tcp" }, { "port": "53", "state": "closed", "service": "domain", "protocol": "tcp" }, { "port": "80", "state": "open", "service": "http", "protocol": "tcp" }, ... ] ``` %package -n python3-scanless Summary: An online port scan scraper. Provides: python-scanless BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-scanless # scanless This is a Python command-line utility and library for using websites that can perform port scans on your behalf. ## Supported Online Port Scanners * [ipfingerprints](http://www.ipfingerprints.com/portscan.php) * [spiderip](https://spiderip.com/online-port-scan.php) * [standingtech](https://portscanner.standingtech.com/) * [viewdns](http://viewdns.info/) * [yougetsignal](http://www.yougetsignal.com/tools/open-ports/) ## Install Do it up: ``` $ pip install scanless --user ``` ## CLI Usage ``` $ scanless --help usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] [-d] scanless, an online port scan scraper. options: -h, --help show this help message and exit -v, --version display the current version -t TARGET, --target TARGET ip or domain to scan -s SCANNER, --scanner SCANNER scanner to use (default: yougetsignal) -r, --random use a random scanner -l, --list list scanners -a, --all use all the scanners -d, --debug debug mode (cli mode off & show network errors) $ scanless --list +----------------+--------------------------------------+ | Scanner Name | Website | +----------------+--------------------------------------+ | ipfingerprints | https://www.ipfingerprints.com | | spiderip | https://spiderip.com | | standingtech | https://portscanner.standingtech.com | | viewdns | https://viewdns.info | | yougetsignal | https://www.yougetsignal.com | +----------------+--------------------------------------+ $ scanless -t scanme.nmap.org -s spiderip Running scanless v2.2.1 ... spiderip: PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 25/tcp closed smtp 80/tcp open http 110/tcp closed pop3 143/tcp closed imap 443/tcp closed https 465/tcp closed smtps 993/tcp closed imaps 995/tcp closed pop3s 1433/tcp closed ms-sql-s 3306/tcp closed mysql 3389/tcp closed ms-wbt-server 5900/tcp closed vnc 8080/tcp closed http-proxy 8443/tcp closed https-alt ``` ## Library Usage ``` >>> import scanless >>> sl = scanless.Scanless() >>> output = sl.scan('scanme.nmap.org', scanner='yougetsignal') >>> print(output['raw']) PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 23/tcp closed telnet 25/tcp closed smtp 53/tcp closed domain 80/tcp open http 110/tcp closed pop3 115/tcp closed sftp 135/tcp closed msrpc 139/tcp closed netbios-ssn 143/tcp closed imap 194/tcp closed irc 443/tcp closed https 445/tcp closed microsoft-ds 1433/tcp closed ms-sql-s 3306/tcp closed mysql 3389/tcp closed ms-wbt-server 5632/tcp closed pcanywherestat 5900/tcp closed vnc 6112/tcp closed dtspc >>> import json >>> print(json.dumps(output['parsed'], indent=2)) [ { "port": "21", "state": "closed", "service": "ftp", "protocol": "tcp" }, { "port": "22", "state": "open", "service": "ssh", "protocol": "tcp" }, { "port": "23", "state": "closed", "service": "telnet", "protocol": "tcp" }, { "port": "25", "state": "closed", "service": "smtp", "protocol": "tcp" }, { "port": "53", "state": "closed", "service": "domain", "protocol": "tcp" }, { "port": "80", "state": "open", "service": "http", "protocol": "tcp" }, ... ] ``` %package help Summary: Development documents and examples for scanless Provides: python3-scanless-doc %description help # scanless This is a Python command-line utility and library for using websites that can perform port scans on your behalf. ## Supported Online Port Scanners * [ipfingerprints](http://www.ipfingerprints.com/portscan.php) * [spiderip](https://spiderip.com/online-port-scan.php) * [standingtech](https://portscanner.standingtech.com/) * [viewdns](http://viewdns.info/) * [yougetsignal](http://www.yougetsignal.com/tools/open-ports/) ## Install Do it up: ``` $ pip install scanless --user ``` ## CLI Usage ``` $ scanless --help usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] [-d] scanless, an online port scan scraper. options: -h, --help show this help message and exit -v, --version display the current version -t TARGET, --target TARGET ip or domain to scan -s SCANNER, --scanner SCANNER scanner to use (default: yougetsignal) -r, --random use a random scanner -l, --list list scanners -a, --all use all the scanners -d, --debug debug mode (cli mode off & show network errors) $ scanless --list +----------------+--------------------------------------+ | Scanner Name | Website | +----------------+--------------------------------------+ | ipfingerprints | https://www.ipfingerprints.com | | spiderip | https://spiderip.com | | standingtech | https://portscanner.standingtech.com | | viewdns | https://viewdns.info | | yougetsignal | https://www.yougetsignal.com | +----------------+--------------------------------------+ $ scanless -t scanme.nmap.org -s spiderip Running scanless v2.2.1 ... spiderip: PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 25/tcp closed smtp 80/tcp open http 110/tcp closed pop3 143/tcp closed imap 443/tcp closed https 465/tcp closed smtps 993/tcp closed imaps 995/tcp closed pop3s 1433/tcp closed ms-sql-s 3306/tcp closed mysql 3389/tcp closed ms-wbt-server 5900/tcp closed vnc 8080/tcp closed http-proxy 8443/tcp closed https-alt ``` ## Library Usage ``` >>> import scanless >>> sl = scanless.Scanless() >>> output = sl.scan('scanme.nmap.org', scanner='yougetsignal') >>> print(output['raw']) PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 23/tcp closed telnet 25/tcp closed smtp 53/tcp closed domain 80/tcp open http 110/tcp closed pop3 115/tcp closed sftp 135/tcp closed msrpc 139/tcp closed netbios-ssn 143/tcp closed imap 194/tcp closed irc 443/tcp closed https 445/tcp closed microsoft-ds 1433/tcp closed ms-sql-s 3306/tcp closed mysql 3389/tcp closed ms-wbt-server 5632/tcp closed pcanywherestat 5900/tcp closed vnc 6112/tcp closed dtspc >>> import json >>> print(json.dumps(output['parsed'], indent=2)) [ { "port": "21", "state": "closed", "service": "ftp", "protocol": "tcp" }, { "port": "22", "state": "open", "service": "ssh", "protocol": "tcp" }, { "port": "23", "state": "closed", "service": "telnet", "protocol": "tcp" }, { "port": "25", "state": "closed", "service": "smtp", "protocol": "tcp" }, { "port": "53", "state": "closed", "service": "domain", "protocol": "tcp" }, { "port": "80", "state": "open", "service": "http", "protocol": "tcp" }, ... ] ``` %prep %autosetup -n scanless-2.2.1 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-scanless -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Mon Apr 10 2023 Python_Bot - 2.2.1-1 - Package Spec generated