Date: Thu, 25 Jul 2024 18:22:49 GMT From: Vladimir Druzenko <vvd@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 2f3f70a3621c - main - security/exploit-pattern: new port: Python Exploit Pattern Tool Message-ID: <202407251822.46PIMnCj023674@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by vvd: URL: https://cgit.FreeBSD.org/ports/commit/?id=2f3f70a3621c503f5e521c732205a713640ec5b0 commit 2f3f70a3621c503f5e521c732205a713640ec5b0 Author: gatekeeper <tiago.gasiba@gmail.com> AuthorDate: 2024-07-25 18:20:51 +0000 Commit: Vladimir Druzenko <vvd@FreeBSD.org> CommitDate: 2024-07-25 18:20:51 +0000 security/exploit-pattern: new port: Python Exploit Pattern Tool Python implementation of Metasploit's pattern generator and search. Should be python version agnostic, tested and working with Python 2.7.12 up to and including Python 3.11.1 Starts faster and rolls both tools into one. No extra dependencies required, works with vanilla python https://github.com/Svenito/exploit-pattern PR: 280341 --- security/Makefile | 1 + security/exploit-pattern/Makefile | 27 +++++++++++++++++++++++++++ security/exploit-pattern/distinfo | 3 +++ security/exploit-pattern/pkg-descr | 7 +++++++ 4 files changed, 38 insertions(+) diff --git a/security/Makefile b/security/Makefile index 9a7e26c5dbde..4af850de59a2 100644 --- a/security/Makefile +++ b/security/Makefile @@ -150,6 +150,7 @@ SUBDIR += enchive SUBDIR += eschalot SUBDIR += expiretable + SUBDIR += exploit-pattern SUBDIR += fakeident SUBDIR += fakeroot SUBDIR += farmhash diff --git a/security/exploit-pattern/Makefile b/security/exploit-pattern/Makefile new file mode 100644 index 000000000000..a36d3b4311a6 --- /dev/null +++ b/security/exploit-pattern/Makefile @@ -0,0 +1,27 @@ +PORTNAME= exploit-pattern +DISTVERSION= g20230527 +CATEGORIES= security + +MAINTAINER= tiago.gasiba@gmail.com +COMMENT= Generate and search pattern string for exploit development +WWW= https://github.com/${GH_ACCOUNT}/${PORTNAME} + +LICENSE= MIT +LICENSE_FILE= ${WRKSRC}/LICENSE.md + +USES= python:run shebangfix +USE_GITHUB= yes +GH_ACCOUNT= Svenito +GH_TAGNAME= 59bb0c5 + +SHEBANG_FILES= pattern.py + +NO_ARCH= yes +NO_BUILD= yes + +PLIST_FILES= bin/pattern + +do-install: + ${INSTALL_SCRIPT} ${WRKSRC}/pattern.py ${STAGEDIR}${PREFIX}/bin/pattern + +.include <bsd.port.mk> diff --git a/security/exploit-pattern/distinfo b/security/exploit-pattern/distinfo new file mode 100644 index 000000000000..842816b2eae9 --- /dev/null +++ b/security/exploit-pattern/distinfo @@ -0,0 +1,3 @@ +TIMESTAMP = 1721929279 +SHA256 (Svenito-exploit-pattern-g20230527-59bb0c5_GH0.tar.gz) = 65d0e50a889a542617bb7664913a64a7dce45e7ef38df612329213e1adf7017b +SIZE (Svenito-exploit-pattern-g20230527-59bb0c5_GH0.tar.gz) = 2964 diff --git a/security/exploit-pattern/pkg-descr b/security/exploit-pattern/pkg-descr new file mode 100644 index 000000000000..083544d8c299 --- /dev/null +++ b/security/exploit-pattern/pkg-descr @@ -0,0 +1,7 @@ +Python implementation of Metasploit's pattern generator and search. +Should be python version agnostic, tested and working with Python +2.7.12 up to and including Python 3.11.1 + +Starts faster and rolls both tools into one. + +No extra dependencies required, works with vanilla python
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202407251822.46PIMnCj023674>