%global _empty_manifest_terminate_build 0 Name: python-pywhat Version: 5.1.0 Release: 1 Summary: What is that thing? License: MIT URL: https://pypi.org/project/pywhat/ Source0: https://mirrors.nju.edu.cn/pypi/web/packages/ae/31/57bb23df3d3474c1e0a0ae207f8571e763018fa064823310a76758eaef81/pywhat-5.1.0.tar.gz BuildArch: noarch Requires: python3-click Requires: python3-rich Requires: python3-orjson %description

➡️ Discord ⬅️
The easiest way to identify anything
pip3 install pywhat && pywhat --help

Discord PyPI - Downloads Twitter Follow PyPI - Python Version PyPI


# 🤔 `What` is this? ![](images/main_demo.gif) Imagine this: You come across some mysterious text 🧙‍♂️ `0x52908400098527886E0F7030069857D2E4169EE7` or `dQw4w9WgXcQ` and you wonder what it is. What do you do? Well, with `what` all you have to do is ask `what "0x52908400098527886E0F7030069857D2E4169EE7"` and `what` will tell you! `what`'s job is to **identify _what_ something is.** Whether it be a file or text! Or even the hex of a file! What about text _within_ files? We have that too! `what` is recursive, it will identify **everything** in text and more! # Installation ## 🔨 Using pip ```$ pip3 install pywhat``` or ```shell # installs optional dependencies that may improve the speed $ pip3 install pywhat[optimize] ``` ## 🔨 On Mac? ```$ brew install pywhat``` Or for our MacPorts fans: ```$ sudo port install pywhat``` # ⚙ Use Cases ## 🦠 Wannacry ![](images/wannacry_demo.png) You come across a new piece of malware called WantToCry. You think back to Wannacry and remember it was stopped because a researcher found a kill-switch in the code. When a domain, hardcoded into Wannacry, was registered the virus would stop. You use `What` to identify all the domains in the malware, and use a domain registrar API to register all the domains. ## 🦈 Faster Analysis of Pcap files ![](images/pcap_demo.gif) Say you have a `.pcap` file from a network attack. `What` can identify this and quickly find you: - All URLs - Emails - Phone numbers - Credit card numbers - Cryptocurrency addresses - Social Security Numbers - and much more. With `what`, you can identify the important things in the pcap in seconds, not minutes. ## 🐞 Bug Bounties You can use PyWhat to scan for things that'll make you money via bug bounties like: * API Keys * Webhooks * Credentials * and more Run PyWhat with: ``` pywhat --include "Bug Bounty" TEXT ``` To do this. Here are some examples 👇 ### 🐙 GitHub Repository API Key Leaks 1. Download all GitHub repositories of an organisation 2. Search for anything that you can submit as a bounty, like API keys ```shell # Download all repositories GHUSER=CHANGEME; curl "https://api.github.com/users/$GHUSER/repos?per_page=1000" | grep -o 'git@[^"]*' | xargs -L1 git clone # Will print when it finds things. # Loops over all files in current directory. find . -type f -execdir pywhat --include 'Bug Bounty' {} \; ``` ### 🕷 Scan all web pages for bounties ```shell # Recursively download all web pages of a site wget -r -np -k https://skerritt.blog # Will print when it finds things. # Loops over all files in current directory. find . -type f -execdir pywhat --include 'Bug Bounty' {} \; ``` **PS**: We support more filters than just bug bounties! Run `pywhat --tags` ## 🌌 Other Features Anytime you have a file and you want to find structured data in it that's useful, `What` is for you. Or if you come across some piece of text and you don't know what it is, `What` will tell you. ### 📁 File & Directory Handling **File Opening** You can pass in a file path by `what 'this/is/a/file/path'`. `What` is smart enough to figure out it's a file! What about a whole **directory**? `What` can handle that too! It will **recursively** search for files and output everything you need! ### 🔍 Filtering your output Sometimes, you only care about seeing things which are related to AWS. Or bug bounties, or cryptocurrencies! You can filter output by using `what --rarity 0.2:0.8 --include Identifiers,URL https://skerritt.blog`. Use `what --help` to get more information. To see all filters, run `pywhat --tags`! You can also combine them, for example to see all cryptocurrency wallets minus Ripple you can do: ```console pywhat --include "Cryptocurrency Wallet" --exclude "Ripple Wallet" 1KFHE7w8BhaENAswwryaoccDb6qcT6DbYY ``` ### 👽 Sorting, Exporting, and more! **Sorting** You can sort the output by using `what -k rarity --reverse TEXT`. Use `what --help` to get more information. **Exporting** You can export to json using `what --json` and results can be sent directly to a file using `what --json > file.json`. **Boundaryless mode** `What` has a special mode to match identifiable information within strings. By default, it is enabled in CLI but disabled in API. Use `what --help` or refer to [API Documentation](https://github.com/bee-san/pyWhat/wiki/API) for more information. # 🍕 API PyWhat has an API! Click here [https://github.com/bee-san/pyWhat/wiki/API](https://github.com/bee-san/pyWhat/wiki/API) to read about it. # 👾 Contributing `what` not only thrives on contributors, but can't exist without them! If you want to add a new regex to check for things, you can read our documentation [here](https://github.com/bee-san/what/wiki/Adding-your-own-Regex) We ask contributors to join the Discord for quicker discussions, but it's not needed: Discord # 🙏 Thanks We would like to thank [Dora](https://github.com/sdushantha/dora) for their work on a bug bounty specific regex database which we have used. %package -n python3-pywhat Summary: What is that thing? Provides: python-pywhat BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-pywhat

➡️ Discord ⬅️
The easiest way to identify anything
pip3 install pywhat && pywhat --help

Discord PyPI - Downloads Twitter Follow PyPI - Python Version PyPI


# 🤔 `What` is this? ![](images/main_demo.gif) Imagine this: You come across some mysterious text 🧙‍♂️ `0x52908400098527886E0F7030069857D2E4169EE7` or `dQw4w9WgXcQ` and you wonder what it is. What do you do? Well, with `what` all you have to do is ask `what "0x52908400098527886E0F7030069857D2E4169EE7"` and `what` will tell you! `what`'s job is to **identify _what_ something is.** Whether it be a file or text! Or even the hex of a file! What about text _within_ files? We have that too! `what` is recursive, it will identify **everything** in text and more! # Installation ## 🔨 Using pip ```$ pip3 install pywhat``` or ```shell # installs optional dependencies that may improve the speed $ pip3 install pywhat[optimize] ``` ## 🔨 On Mac? ```$ brew install pywhat``` Or for our MacPorts fans: ```$ sudo port install pywhat``` # ⚙ Use Cases ## 🦠 Wannacry ![](images/wannacry_demo.png) You come across a new piece of malware called WantToCry. You think back to Wannacry and remember it was stopped because a researcher found a kill-switch in the code. When a domain, hardcoded into Wannacry, was registered the virus would stop. You use `What` to identify all the domains in the malware, and use a domain registrar API to register all the domains. ## 🦈 Faster Analysis of Pcap files ![](images/pcap_demo.gif) Say you have a `.pcap` file from a network attack. `What` can identify this and quickly find you: - All URLs - Emails - Phone numbers - Credit card numbers - Cryptocurrency addresses - Social Security Numbers - and much more. With `what`, you can identify the important things in the pcap in seconds, not minutes. ## 🐞 Bug Bounties You can use PyWhat to scan for things that'll make you money via bug bounties like: * API Keys * Webhooks * Credentials * and more Run PyWhat with: ``` pywhat --include "Bug Bounty" TEXT ``` To do this. Here are some examples 👇 ### 🐙 GitHub Repository API Key Leaks 1. Download all GitHub repositories of an organisation 2. Search for anything that you can submit as a bounty, like API keys ```shell # Download all repositories GHUSER=CHANGEME; curl "https://api.github.com/users/$GHUSER/repos?per_page=1000" | grep -o 'git@[^"]*' | xargs -L1 git clone # Will print when it finds things. # Loops over all files in current directory. find . -type f -execdir pywhat --include 'Bug Bounty' {} \; ``` ### 🕷 Scan all web pages for bounties ```shell # Recursively download all web pages of a site wget -r -np -k https://skerritt.blog # Will print when it finds things. # Loops over all files in current directory. find . -type f -execdir pywhat --include 'Bug Bounty' {} \; ``` **PS**: We support more filters than just bug bounties! Run `pywhat --tags` ## 🌌 Other Features Anytime you have a file and you want to find structured data in it that's useful, `What` is for you. Or if you come across some piece of text and you don't know what it is, `What` will tell you. ### 📁 File & Directory Handling **File Opening** You can pass in a file path by `what 'this/is/a/file/path'`. `What` is smart enough to figure out it's a file! What about a whole **directory**? `What` can handle that too! It will **recursively** search for files and output everything you need! ### 🔍 Filtering your output Sometimes, you only care about seeing things which are related to AWS. Or bug bounties, or cryptocurrencies! You can filter output by using `what --rarity 0.2:0.8 --include Identifiers,URL https://skerritt.blog`. Use `what --help` to get more information. To see all filters, run `pywhat --tags`! You can also combine them, for example to see all cryptocurrency wallets minus Ripple you can do: ```console pywhat --include "Cryptocurrency Wallet" --exclude "Ripple Wallet" 1KFHE7w8BhaENAswwryaoccDb6qcT6DbYY ``` ### 👽 Sorting, Exporting, and more! **Sorting** You can sort the output by using `what -k rarity --reverse TEXT`. Use `what --help` to get more information. **Exporting** You can export to json using `what --json` and results can be sent directly to a file using `what --json > file.json`. **Boundaryless mode** `What` has a special mode to match identifiable information within strings. By default, it is enabled in CLI but disabled in API. Use `what --help` or refer to [API Documentation](https://github.com/bee-san/pyWhat/wiki/API) for more information. # 🍕 API PyWhat has an API! Click here [https://github.com/bee-san/pyWhat/wiki/API](https://github.com/bee-san/pyWhat/wiki/API) to read about it. # 👾 Contributing `what` not only thrives on contributors, but can't exist without them! If you want to add a new regex to check for things, you can read our documentation [here](https://github.com/bee-san/what/wiki/Adding-your-own-Regex) We ask contributors to join the Discord for quicker discussions, but it's not needed: Discord # 🙏 Thanks We would like to thank [Dora](https://github.com/sdushantha/dora) for their work on a bug bounty specific regex database which we have used. %package help Summary: Development documents and examples for pywhat Provides: python3-pywhat-doc %description help

➡️ Discord ⬅️
The easiest way to identify anything
pip3 install pywhat && pywhat --help

Discord PyPI - Downloads Twitter Follow PyPI - Python Version PyPI


# 🤔 `What` is this? ![](images/main_demo.gif) Imagine this: You come across some mysterious text 🧙‍♂️ `0x52908400098527886E0F7030069857D2E4169EE7` or `dQw4w9WgXcQ` and you wonder what it is. What do you do? Well, with `what` all you have to do is ask `what "0x52908400098527886E0F7030069857D2E4169EE7"` and `what` will tell you! `what`'s job is to **identify _what_ something is.** Whether it be a file or text! Or even the hex of a file! What about text _within_ files? We have that too! `what` is recursive, it will identify **everything** in text and more! # Installation ## 🔨 Using pip ```$ pip3 install pywhat``` or ```shell # installs optional dependencies that may improve the speed $ pip3 install pywhat[optimize] ``` ## 🔨 On Mac? ```$ brew install pywhat``` Or for our MacPorts fans: ```$ sudo port install pywhat``` # ⚙ Use Cases ## 🦠 Wannacry ![](images/wannacry_demo.png) You come across a new piece of malware called WantToCry. You think back to Wannacry and remember it was stopped because a researcher found a kill-switch in the code. When a domain, hardcoded into Wannacry, was registered the virus would stop. You use `What` to identify all the domains in the malware, and use a domain registrar API to register all the domains. ## 🦈 Faster Analysis of Pcap files ![](images/pcap_demo.gif) Say you have a `.pcap` file from a network attack. `What` can identify this and quickly find you: - All URLs - Emails - Phone numbers - Credit card numbers - Cryptocurrency addresses - Social Security Numbers - and much more. With `what`, you can identify the important things in the pcap in seconds, not minutes. ## 🐞 Bug Bounties You can use PyWhat to scan for things that'll make you money via bug bounties like: * API Keys * Webhooks * Credentials * and more Run PyWhat with: ``` pywhat --include "Bug Bounty" TEXT ``` To do this. Here are some examples 👇 ### 🐙 GitHub Repository API Key Leaks 1. Download all GitHub repositories of an organisation 2. Search for anything that you can submit as a bounty, like API keys ```shell # Download all repositories GHUSER=CHANGEME; curl "https://api.github.com/users/$GHUSER/repos?per_page=1000" | grep -o 'git@[^"]*' | xargs -L1 git clone # Will print when it finds things. # Loops over all files in current directory. find . -type f -execdir pywhat --include 'Bug Bounty' {} \; ``` ### 🕷 Scan all web pages for bounties ```shell # Recursively download all web pages of a site wget -r -np -k https://skerritt.blog # Will print when it finds things. # Loops over all files in current directory. find . -type f -execdir pywhat --include 'Bug Bounty' {} \; ``` **PS**: We support more filters than just bug bounties! Run `pywhat --tags` ## 🌌 Other Features Anytime you have a file and you want to find structured data in it that's useful, `What` is for you. Or if you come across some piece of text and you don't know what it is, `What` will tell you. ### 📁 File & Directory Handling **File Opening** You can pass in a file path by `what 'this/is/a/file/path'`. `What` is smart enough to figure out it's a file! What about a whole **directory**? `What` can handle that too! It will **recursively** search for files and output everything you need! ### 🔍 Filtering your output Sometimes, you only care about seeing things which are related to AWS. Or bug bounties, or cryptocurrencies! You can filter output by using `what --rarity 0.2:0.8 --include Identifiers,URL https://skerritt.blog`. Use `what --help` to get more information. To see all filters, run `pywhat --tags`! You can also combine them, for example to see all cryptocurrency wallets minus Ripple you can do: ```console pywhat --include "Cryptocurrency Wallet" --exclude "Ripple Wallet" 1KFHE7w8BhaENAswwryaoccDb6qcT6DbYY ``` ### 👽 Sorting, Exporting, and more! **Sorting** You can sort the output by using `what -k rarity --reverse TEXT`. Use `what --help` to get more information. **Exporting** You can export to json using `what --json` and results can be sent directly to a file using `what --json > file.json`. **Boundaryless mode** `What` has a special mode to match identifiable information within strings. By default, it is enabled in CLI but disabled in API. Use `what --help` or refer to [API Documentation](https://github.com/bee-san/pyWhat/wiki/API) for more information. # 🍕 API PyWhat has an API! Click here [https://github.com/bee-san/pyWhat/wiki/API](https://github.com/bee-san/pyWhat/wiki/API) to read about it. # 👾 Contributing `what` not only thrives on contributors, but can't exist without them! If you want to add a new regex to check for things, you can read our documentation [here](https://github.com/bee-san/what/wiki/Adding-your-own-Regex) We ask contributors to join the Discord for quicker discussions, but it's not needed: Discord # 🙏 Thanks We would like to thank [Dora](https://github.com/sdushantha/dora) for their work on a bug bounty specific regex database which we have used. %prep %autosetup -n pywhat-5.1.0 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-pywhat -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Fri May 05 2023 Python_Bot - 5.1.0-1 - Package Spec generated