%global _empty_manifest_terminate_build 0 Name: python-scanless Version: 2.1.6 Release: 1 Summary: An online port scan scraper. License: Unlicense URL: https://github.com/vesche/scanless Source0: https://mirrors.nju.edu.cn/pypi/web/packages/44/0c/a397efb5777d22b49e92e009bc5907c96ac845ffa57d43e3356779c1954f/scanless-2.1.6.tar.gz BuildArch: noarch %description # scanless This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf. ## Supported Online Port Scanners * [hackertarget](https://hackertarget.com/nmap-online-port-scanner/) * [ipfingerprints](http://www.ipfingerprints.com/portscan.php) * [spiderip](https://spiderip.com/online-port-scan.php) * [standingtech](https://portscanner.standingtech.com/) * [viewdns](http://viewdns.info/) * [yougetsignal](http://www.yougetsignal.com/tools/open-ports/) ## Install Do it up: ``` $ pip install scanless --user ``` ## CLI Usage ``` $ scanless --help usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] scanless, an online port scan scraper. optional arguments: -h, --help show this help message and exit -v, --version display the current version -t TARGET, --target TARGET ip or domain to scan -s SCANNER, --scanner SCANNER scanner to use (default: hackertarget) -r, --random use a random scanner -l, --list list scanners -a, --all use all the scanners -d, --debug debug mode (cli mode off & show network errors) $ scanless --list +----------------+--------------------------------------+ | Scanner Name | Website | +----------------+--------------------------------------+ | hackertarget | https://hackertarget.com | | ipfingerprints | https://www.ipfingerprints.com | | spiderip | https://spiderip.com | | standingtech | https://portscanner.standingtech.com | | viewdns | https://viewdns.info | | yougetsignal | https://www.yougetsignal.com | +----------------+--------------------------------------+ $ scanless -t scanme.nmap.org -s spiderip Running scanless v2.1.6... spiderip: PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 25/tcp closed smtp 80/tcp open http 110/tcp closed pop3 143/tcp closed imap 443/tcp closed https 465/tcp closed smtps 993/tcp closed imaps 995/tcp closed pop3s 1433/tcp closed ms-sql-s 3306/tcp closed mysql 3389/tcp closed ms-wbt-server 5900/tcp closed vnc 8080/tcp closed http-proxy 8443/tcp closed https-alt ``` ## Library Usage ``` >>> import scanless >>> sl = scanless.Scanless() >>> output = sl.scan('scanme.nmap.org', scanner='hackertarget') >>> print(output['raw']) Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC Nmap scan report for scanme.nmap.org (45.33.32.156) Host is up (0.065s latency). Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 80/tcp open http 443/tcp closed https Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds >>> import json >>> print(json.dumps(output['parsed'], indent=2)) [ { "port": "21", "state": "closed", "service": "ftp", "protocol": "tcp" }, { "port": "22", "state": "open", "service": "ssh", "protocol": "tcp" }, { "port": "80", "state": "open", "service": "http", "protocol": "tcp" }, { "port": "443", "state": "closed", "service": "https", "protocol": "tcp" } ] ``` %package -n python3-scanless Summary: An online port scan scraper. Provides: python-scanless BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-scanless # scanless This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf. ## Supported Online Port Scanners * [hackertarget](https://hackertarget.com/nmap-online-port-scanner/) * [ipfingerprints](http://www.ipfingerprints.com/portscan.php) * [spiderip](https://spiderip.com/online-port-scan.php) * [standingtech](https://portscanner.standingtech.com/) * [viewdns](http://viewdns.info/) * [yougetsignal](http://www.yougetsignal.com/tools/open-ports/) ## Install Do it up: ``` $ pip install scanless --user ``` ## CLI Usage ``` $ scanless --help usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] scanless, an online port scan scraper. optional arguments: -h, --help show this help message and exit -v, --version display the current version -t TARGET, --target TARGET ip or domain to scan -s SCANNER, --scanner SCANNER scanner to use (default: hackertarget) -r, --random use a random scanner -l, --list list scanners -a, --all use all the scanners -d, --debug debug mode (cli mode off & show network errors) $ scanless --list +----------------+--------------------------------------+ | Scanner Name | Website | +----------------+--------------------------------------+ | hackertarget | https://hackertarget.com | | ipfingerprints | https://www.ipfingerprints.com | | spiderip | https://spiderip.com | | standingtech | https://portscanner.standingtech.com | | viewdns | https://viewdns.info | | yougetsignal | https://www.yougetsignal.com | +----------------+--------------------------------------+ $ scanless -t scanme.nmap.org -s spiderip Running scanless v2.1.6... spiderip: PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 25/tcp closed smtp 80/tcp open http 110/tcp closed pop3 143/tcp closed imap 443/tcp closed https 465/tcp closed smtps 993/tcp closed imaps 995/tcp closed pop3s 1433/tcp closed ms-sql-s 3306/tcp closed mysql 3389/tcp closed ms-wbt-server 5900/tcp closed vnc 8080/tcp closed http-proxy 8443/tcp closed https-alt ``` ## Library Usage ``` >>> import scanless >>> sl = scanless.Scanless() >>> output = sl.scan('scanme.nmap.org', scanner='hackertarget') >>> print(output['raw']) Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC Nmap scan report for scanme.nmap.org (45.33.32.156) Host is up (0.065s latency). Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 80/tcp open http 443/tcp closed https Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds >>> import json >>> print(json.dumps(output['parsed'], indent=2)) [ { "port": "21", "state": "closed", "service": "ftp", "protocol": "tcp" }, { "port": "22", "state": "open", "service": "ssh", "protocol": "tcp" }, { "port": "80", "state": "open", "service": "http", "protocol": "tcp" }, { "port": "443", "state": "closed", "service": "https", "protocol": "tcp" } ] ``` %package help Summary: Development documents and examples for scanless Provides: python3-scanless-doc %description help # scanless This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf. ## Supported Online Port Scanners * [hackertarget](https://hackertarget.com/nmap-online-port-scanner/) * [ipfingerprints](http://www.ipfingerprints.com/portscan.php) * [spiderip](https://spiderip.com/online-port-scan.php) * [standingtech](https://portscanner.standingtech.com/) * [viewdns](http://viewdns.info/) * [yougetsignal](http://www.yougetsignal.com/tools/open-ports/) ## Install Do it up: ``` $ pip install scanless --user ``` ## CLI Usage ``` $ scanless --help usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] scanless, an online port scan scraper. optional arguments: -h, --help show this help message and exit -v, --version display the current version -t TARGET, --target TARGET ip or domain to scan -s SCANNER, --scanner SCANNER scanner to use (default: hackertarget) -r, --random use a random scanner -l, --list list scanners -a, --all use all the scanners -d, --debug debug mode (cli mode off & show network errors) $ scanless --list +----------------+--------------------------------------+ | Scanner Name | Website | +----------------+--------------------------------------+ | hackertarget | https://hackertarget.com | | ipfingerprints | https://www.ipfingerprints.com | | spiderip | https://spiderip.com | | standingtech | https://portscanner.standingtech.com | | viewdns | https://viewdns.info | | yougetsignal | https://www.yougetsignal.com | +----------------+--------------------------------------+ $ scanless -t scanme.nmap.org -s spiderip Running scanless v2.1.6... spiderip: PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 25/tcp closed smtp 80/tcp open http 110/tcp closed pop3 143/tcp closed imap 443/tcp closed https 465/tcp closed smtps 993/tcp closed imaps 995/tcp closed pop3s 1433/tcp closed ms-sql-s 3306/tcp closed mysql 3389/tcp closed ms-wbt-server 5900/tcp closed vnc 8080/tcp closed http-proxy 8443/tcp closed https-alt ``` ## Library Usage ``` >>> import scanless >>> sl = scanless.Scanless() >>> output = sl.scan('scanme.nmap.org', scanner='hackertarget') >>> print(output['raw']) Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC Nmap scan report for scanme.nmap.org (45.33.32.156) Host is up (0.065s latency). Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 80/tcp open http 443/tcp closed https Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds >>> import json >>> print(json.dumps(output['parsed'], indent=2)) [ { "port": "21", "state": "closed", "service": "ftp", "protocol": "tcp" }, { "port": "22", "state": "open", "service": "ssh", "protocol": "tcp" }, { "port": "80", "state": "open", "service": "http", "protocol": "tcp" }, { "port": "443", "state": "closed", "service": "https", "protocol": "tcp" } ] ``` %prep %autosetup -n scanless-2.1.6 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-scanless -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Thu Mar 09 2023 Python_Bot - 2.1.6-1 - Package Spec generated