packetstormexploits: monthly bump

This commit is contained in:
Anton Bolshakov 2013-09-02 07:03:03 +00:00
parent 6e13f6de9e
commit 67ff52f928
2 changed files with 58 additions and 0 deletions

View file

@ -5,6 +5,7 @@ DIST 1304-exploits.tgz 857662 SHA256 796a707a40714a19684c71eaa704f1afa8f4783db71
DIST 1305-exploits.tgz 204920 SHA256 c29831f658ed77c2534eddffe84f7ab2fbc633835a65c57ff018013e6ceac702 SHA512 66cfd3b343b4e146d8b75a0262919e393ae2754175ef48d567168e6f37198de2e55affabb59a73e565344a79e8a229538079a3f7ec509a830d73fee404f07214 WHIRLPOOL 712935a17c72d9dbcfc8517a37a3f3258ec2fdd8790840979b1e5d932b79489a74181496751a180d0d67bce778eb247abfdc7a0baf886d2579771f1c320626f1
DIST 1306-exploits.tgz 279382 SHA256 95019076b638e2f09aaf08a7874f0386a18e21c90290b3a25dd85a226c5662bc SHA512 de31af9f5b6b49d104ad22218d459f520ca4556ae071215d20d04df1031d472182e0fb65a81d55e321014a467c0e1c3e1106986a353e938d5400ff6ad3cc7ee6 WHIRLPOOL f4279f6e5cf13bcb55ad54727d280d450ca063c85894b004001f5856b014ef8105c9c4baf73fab83e19e7f4fe3133688de824c63479d9fdb13f553d2571ca0c3
DIST 1307-exploits.tgz 407745 SHA256 0a0985c7d5fdcaabbf25a53953410fd592cdcbfc6dacbbb8c55ddb3e55a12e42 SHA512 4b9f5e915dc80a2648c0d71848af1a94abfbd7fe4d392d4b3f49cadf86e19f36106cda4a1ce68be70aca4af55c9eff20278cc059714d79eaedee250eaaae492c WHIRLPOOL c46951ae6106e43eff276e1ae9323425ab953cd8dca6c0e8ad5c854d7c545f90e0ab9b97e5c1f50b2a816bb53665496d257d76b6742cd585989e78eb1daa59dd
DIST 1308-exploits.tgz 17629391 SHA256 058cdd9ee708055a538eca696d3d41f58b70c1432ccddd8b82e1c322ee38d708 SHA512 e53f0ce8eef8885e3603e7014030b80ca0dcc37d5ab145a0f9b11bca32ab46f0829e3f09dd13ceb8004d5e32966e7493cb32937949db22cac32c4eadb34c16fa WHIRLPOOL b59a15bb76f5653ff7de81e9d3ea3bf89431309d27e989174b4aa01c89737bd212dbe09763ced4f454c0a7a3c5ace8d79189a06ce35107bdf00aaced82e0b941
DIST 1999-exploits.tgz 6507949 SHA256 67fd709e350500d6439a175f6f5c708796faf47c82557dee6eb14fef418cd70e SHA512 b5274f6a0f3da2c48d7550cc3e033734172b98e13c42600a48b2c5a4b213fbc73a1ebf710ca8719b905c9783dcd620678815fff7d1d97f0832181bd9034e9d9f WHIRLPOOL 5cac3137c4a6a5f0c91de76b81a42ff3110866432bbc3ad41885792e905654f36326c679cce7373aeee0445312916cd34886ed35f8389d9c2cd5fbef22f42469
DIST 2000-exploits.tgz 6530082 SHA256 4ae50131fa96b7884e5a06211b6fd3aa3bd9cddb32775d54716fe237e1df0a77 SHA512 1e1f1fa9e59e7929a4f5c77a8909a781249d21285f00ff33756c97f87f960f9f83db3965eedebc4b401ac6f1c9d7d5bb41bf45c6c45ac036a04319c3c2f463c2 WHIRLPOOL c08b2b47705990b8053bbf49d189ddd83b7b066e5b96cd10f272e4e30c16d27b4772175476926d694970f1c3ce60c89bd6519df09ca75d42e6e7533cf12aca24
DIST 2001-exploits.tgz 4644368 SHA256 74dfc295acf2312c8eacf598a21c3a04546d9682ff83df4ffec02c4606fa6864 SHA512 55494c39ad12b9242f8aff8ecf4f57dd81e5dc8f7e57eaf9721faacf9465b511d4da76038d2a6f5ccbfb36a9ce8f5f949a307fc8e0a765201bd7d611adce0de5 WHIRLPOOL bf28b3b51c595bf0cf3d540a293967ee63c7cf3c9de7d4b468620ac4f97411c0e1904ac1ba822635f158711d02d7f084c43df0c2a117c269cae305c92f57dd10
@ -21,3 +22,4 @@ DIST 2011-exploits.tgz 45169164 SHA256 d289b09b2825205652e7ba4a0699cb0f5cdf2934b
DIST 2012-exploits.tgz 99377239 SHA256 fff9bb87076aec51b411ee266d2877f3b5e72a7aae421e84e40d00b53e62f4c7 SHA512 d072b454492d548a8492edb64808be6c83c284f36fb28929ea29ceb74085f76290c66920b0f1789fd08667c014ad5fab5716b21916a92296bb3313a35ef2f97e WHIRLPOOL 56e48e46c1610d9f2560cebdecc3c80db63ca7b402b11bc3b83b118c5314b4f0705d768bf485b536e50dcaa7be06422ae590c5cccff399f8c874cd394702262d
EBUILD packetstormexploits-2013.06.ebuild 2164 SHA256 b5261d1324b541a6f050c75e77190c15183b62b2bd06839bdddeb5d3f798075e SHA512 9e8bcc2d4dc00f0793a2814c99b274335b09a08f3ef849d0735823fa52319a54590921fc1781b69c76ef414446c25fd6a3178676d07a66459a250d280d55d348 WHIRLPOOL 1a03cfa8c4cf2163b042bb41228b3251aeac022a4ec2a1ce63381eff86a5ab955c56ab5d019526d62b8168a3d074ecc85e412e7d57cb48a9853d7897033d8f66
EBUILD packetstormexploits-2013.07.ebuild 2164 SHA256 b5261d1324b541a6f050c75e77190c15183b62b2bd06839bdddeb5d3f798075e SHA512 9e8bcc2d4dc00f0793a2814c99b274335b09a08f3ef849d0735823fa52319a54590921fc1781b69c76ef414446c25fd6a3178676d07a66459a250d280d55d348 WHIRLPOOL 1a03cfa8c4cf2163b042bb41228b3251aeac022a4ec2a1ce63381eff86a5ab955c56ab5d019526d62b8168a3d074ecc85e412e7d57cb48a9853d7897033d8f66
EBUILD packetstormexploits-2013.08.ebuild 2164 SHA256 b5261d1324b541a6f050c75e77190c15183b62b2bd06839bdddeb5d3f798075e SHA512 9e8bcc2d4dc00f0793a2814c99b274335b09a08f3ef849d0735823fa52319a54590921fc1781b69c76ef414446c25fd6a3178676d07a66459a250d280d55d348 WHIRLPOOL 1a03cfa8c4cf2163b042bb41228b3251aeac022a4ec2a1ce63381eff86a5ab955c56ab5d019526d62b8168a3d074ecc85e412e7d57cb48a9853d7897033d8f66

View file

@ -0,0 +1,56 @@
# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: $
EAPI=5
inherit versionator
AVC=( $(get_version_components) )
MY_PV_YYYY=${AVC[0]}
MY_PV_MM=${AVC[1]}
DESCRIPTION="Archive of packetstorm exploits"
HOMEPAGE="http://packetstorm.wowhacker.com/"
IUSE="1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 +2009 +2010
+2011 +2012 +2013"
SRC_URI="1999? ( http://packetstorm.wowhacker.com/9912-exploits/1999-exploits.tgz )
2000? ( http://packetstorm.wowhacker.com/0012-exploits/2000-exploits.tgz )
2001? ( http://packetstorm.wowhacker.com/0112-exploits/2001-exploits.tgz )
2002? ( http://packetstorm.wowhacker.com/0212-exploits/2002-exploits.tgz )
2003? ( http://packetstorm.wowhacker.com/0312-exploits/2003-exploits.tgz )
2004? ( http://packetstorm.wowhacker.com/0412-exploits/2004-exploits.tgz )
2005? ( http://packetstorm.wowhacker.com/0512-exploits/2005-exploits.tgz )
2006? ( http://packetstorm.wowhacker.com/0612-exploits/2006-exploits.tgz )
2007? ( http://packetstorm.wowhacker.com/0712-exploits/2007-exploits.tgz )
2008? ( http://packetstorm.wowhacker.com/0812-exploits/2008-exploits.tgz )
2009? ( http://packetstorm.wowhacker.com/0912-exploits/2009-exploits.tgz )
2010? ( http://packetstorm.wowhacker.com/1012-exploits/2010-exploits.tgz )
2011? ( http://packetstorm.wowhacker.com/1112-exploits/2011-exploits.tgz )
2012? ( http://packetstorm.wowhacker.com/1212-exploits/2012-exploits.tgz )"
# a little hack for easier bump
SRC_URI="${SRC_URI} 2013? ("
for MY_M in $(eval echo "{1..$MY_PV_MM}"); do
SRC_URI="${SRC_URI} http://packetstorm.wowhacker.com/13${MY_M}-exploits/13${MY_M}-exploits.tgz"
done
SRC_URI="${SRC_URI} )"
LICENSE="as-is"
SLOT="0"
KEYWORDS="amd64 x86 arm"
DEPEND=""
RDEPEND=""
S="${WORKDIR}"
QA_PREBUILT="/usr/share/exploits/packetstormexploits/0001-exploits/bnc246
/usr/share/exploits/packetstormexploits/0212-exploits/kadmin
/usr/share/exploits/packetstormexploits/9902-exploits/SDI-lsof
/usr/share/exploits/packetstormexploits/0204-exploits/7350fun"
src_install() {
insinto /usr/share/exploits/$PN
doins -r * || die "install failed"
}