Merge pull request #597 from gkroon/exploit-pattern

exploit-pattern: new tool
This commit is contained in:
Anton Bolshakov 2020-03-24 07:56:10 +08:00 committed by GitHub
commit 70dbb4ab66
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
4 changed files with 51 additions and 0 deletions

View file

@ -0,0 +1 @@
DIST exploit-pattern-20200109.tar.gz 2434 BLAKE2B bdfb156e6ce1db054c261461d03e2855c336f96540c4d969d2632a7260eabbf13b68f79f80e31e23acf2546134d4fc0ed2ee1aea3cf85b98f6ec1b475ddc39e2 SHA512 5c055381f6fab142b1ebe75061c3c2c1a8fd92ad2b74d99c4bc74f95b495c54bc7ac671bf05c3c0b81aadc2b7dbefb0357bc2f17226bd54ee8e4cce65bb7b8e6

View file

@ -0,0 +1,41 @@
# Copyright 1999-2020 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=7
PYTHON_COMPAT=( python3_{6,7} )
inherit eutils python-single-r1
DESCRIPTION="Generate and search pattern string for exploit development"
HOMEPAGE="https://github.com/Svenito/exploit-pattern"
if [[ ${PV} = *9999 ]]; then
inherit git-r3
EGIT_REPO_URI="https://github.com/Svenito/exploit-pattern.git"
else
HASH_COMMIT="40c8cf63e24f207cadf9783e9453d43a5c312f0d"
SRC_URI="https://github.com/Svenito/exploit-pattern/archive/${HASH_COMMIT}.tar.gz -> ${P}.tar.gz"
KEYWORDS="~amd64 ~x86"
fi
LICENSE="MIT"
SLOT="0"
S="${WORKDIR}/${PN}-${HASH_COMMIT}"
pkg_setup() {
python-single-r1_pkg_setup
}
src_prepare() {
default
python_fix_shebang "${S}"
}
src_install() {
newbin pattern.py pattern
dodoc README.md
}

View file

@ -0,0 +1,8 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<maintainer type="project">
<email>proxy-maint@gentoo.org</email>
<name>Proxy Maintainers</name>
</maintainer>
</pkgmetadata>

View file

@ -17,3 +17,4 @@ app-exploits/unix-privesc-check
app-exploits/webshells
app-exploits/weevely
app-exploits/wesng
app-exploits/exploit-pattern