csync-git
[mirrors/ArchLinux-Packages.git] / milw0rm / PKGBUILD-old
1 # Contributor: Thomas Mudrunka <harvie@@email..cz>
2 # You can also contact me on http://blog.harvie.cz/
3
4 pkgname=milw0rm-exploit-database
5 pkgver=1.0
6 pkgrel=1
7 pkgdesc="Milw0rm (Milworm) exploit database commandline frontend for updating and queriing as easy as (ex.): sudo milw0rm update; milw0rm search apache; milw0rm search port.80; sudo milw0rm usearch another.regexp; etc..."
8 arch=('any')
9 license=('GPL')
10 url="http://milw0rm.com/"
11 depends=()
12
13 build() {
14 mkdir -p ${pkgdir}/usr/bin
15 mkdir -p ${pkgdir}/opt/milw0rm
16
17 echo '
18 #!/bin/bash
19 #download, update and query local exploit database from milw0rm.com
20 #CopyLefted by Harvie 2oo9 (http://blog.harvie.cz/)
21 target_dir="/opt/milw0rm"
22
23 case "$1" in
24 update)
25 if [ $UID != 0 ]; then
26 echo 'You must run Milw0rm update as root!';
27 exit;
28 fi;
29 echo "Downloading exploit archive from Milw0rm..."
30 mkdir -p "$target_dir"
31 cd "$target_dir";
32 wget "http://www.milw0rm.com/sploits/milw0rm.tar.bz2"
33 echo "Extracting archive..."
34 tar jxpf milw0rm.tar.bz2
35 rm milw0rm.tar.bz2
36 cd milw0rm
37 ;;
38 search)
39 cat "$target_dir/milw0rm/sploitlist.txt" | grep -i "$2" | while read line; do
40 echo "$target_dir/milw0rm/$line";
41 done;
42 ;;
43 usearch)
44 $0 update
45 $0 search "$2"
46 ;;
47 *)
48 echo "Local Milw0rm.com exploit database updater"
49 echo "Target directory: $target_dir"
50 echo "usage: $0 {update|search regexp|usearch regexp}"
51 esac
52 ' > ${pkgdir}/usr/bin/milw0rm
53
54 chmod -R 655 ${pkgdir}/
55 }
This page took 0.271565 seconds and 4 git commands to generate.