mirror of
https://git.FreeBSD.org/ports.git
synced 2024-11-23 00:43:28 +00:00
Add gwee, a tool to exploit command execution vulnerabilities in web scripts.
PR: 80639 Submitted by: chinsan <chinsan@mail2000.com.tw> Approved by: novel (mentor)
This commit is contained in:
parent
db82b73355
commit
6b80960850
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=144693
@ -141,6 +141,7 @@
|
||||
SUBDIR += gtk-knocker
|
||||
SUBDIR += gtkpasman
|
||||
SUBDIR += gtkportscan
|
||||
SUBDIR += gwee
|
||||
SUBDIR += hackbot
|
||||
SUBDIR += hafiye
|
||||
SUBDIR += hashish
|
||||
|
34
security/gwee/Makefile
Normal file
34
security/gwee/Makefile
Normal file
@ -0,0 +1,34 @@
|
||||
# New ports collection makefile for: gwee
|
||||
# Date created: 2005-05-04
|
||||
# Whom: chinsan <chinsan@mail2000.com.tw>
|
||||
#
|
||||
# $FreeBSD$
|
||||
#
|
||||
|
||||
PORTNAME= gwee
|
||||
PORTVERSION= 1.36
|
||||
CATEGORIES= security www
|
||||
MASTER_SITES= http://tigerteam.se/dl/gwee/
|
||||
|
||||
MAINTAINER= chinsan.tw@gmail.com
|
||||
COMMENT= Tool to exploit command execution vulnerabilities in web scripts
|
||||
|
||||
USE_OPENSSL= yes
|
||||
USE_PERL5= yes
|
||||
USE_PYTHON= yes
|
||||
|
||||
LDFLAGS+= -lssl -lcrypto
|
||||
CFLAGS+= -DWITH_SSL
|
||||
|
||||
MAN1= gwee.1
|
||||
PLIST_FILES= bin/gwee
|
||||
|
||||
do-build:
|
||||
${CC} ${CFLAGS} ${LDFLAGS} ${WRKSRC}/${PORTNAME}.c \
|
||||
-o ${WRKSRC}/${PORTNAME}
|
||||
|
||||
do-install:
|
||||
${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${PREFIX}/bin
|
||||
${INSTALL_MAN} ${WRKSRC}/${PORTNAME}.1 ${MANPREFIX}/man/man1
|
||||
|
||||
.include <bsd.port.mk>
|
2
security/gwee/distinfo
Normal file
2
security/gwee/distinfo
Normal file
@ -0,0 +1,2 @@
|
||||
MD5 (gwee-1.36.tar.gz) = 4e0c09fdc6a261e80bdba34aba1f9a29
|
||||
SIZE (gwee-1.36.tar.gz) = 313562
|
5
security/gwee/pkg-descr
Normal file
5
security/gwee/pkg-descr
Normal file
@ -0,0 +1,5 @@
|
||||
gwee (Generic Web Exploitation Engine) is a small program written in C designed
|
||||
to exploit input validation vulnerabilities in web scripts, such as Perl CGIs,
|
||||
PHP, etc.
|
||||
|
||||
WWW: http://tigerteam.se/dl/gwee/
|
Loading…
Reference in New Issue
Block a user