Skip to content

Commit

Permalink
Merge pull request #8 from vesche/master
Browse files Browse the repository at this point in the history
v0.2.2 packaged up to add to PyPI.
  • Loading branch information
vulnersCom committed Mar 15, 2018
2 parents 0b8a9e9 + bd3e2c3 commit 1db4256
Show file tree
Hide file tree
Showing 5 changed files with 66 additions and 14 deletions.
4 changes: 4 additions & 0 deletions .gitignore
@@ -0,0 +1,4 @@
*.pyc
*.egg-info/
build/
dist/
2 changes: 2 additions & 0 deletions README.md
Expand Up @@ -13,6 +13,8 @@ Utility was tested on a *python2.6*, *python2.7*, *python3.6* with SQLite FTS4 s

# How to use

Install: `pip install getsploit`

[![asciicast](https://asciinema.org/a/ObuaXdpxNO0nAo6o821fLCLxZ.png)](https://asciinema.org/a/ObuaXdpxNO0nAo6o821fLCLxZ?autoplay=1)

# Search
Expand Down
13 changes: 13 additions & 0 deletions getsploit/__init__.py
@@ -0,0 +1,13 @@
__author__ = "Kir Ermakov <isox(at)vulners.com>"
__copyright__ = "Copyright 2018, Vulners"
__credits__ = ["Kir Ermakov",
"Igor Bulatenko",
"Ivan Elkin",
"Gerome Fournier <jef(at)foutaise.org>",
"JBFC"
]
__license__ = "LGPL"
__version__ = "0.2.2"
__maintainer__ = "Kir Ermakov"
__email__ = "isox@vulners.com"
__status__ = "Release"
16 changes: 2 additions & 14 deletions getsploit.py → getsploit/getsploit.py
@@ -1,20 +1,8 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-
from __future__ import division

__author__ = "Kir Ermakov <isox(at)vulners.com>"
__copyright__ = "Copyright 2017, Vulners"
__credits__ = ["Kir Ermakov",
"Igor Bulatenko",
"Ivan Elkin",
"Gerome Fournier <jef(at)foutaise.org>",
"JBFC"
]
__license__ = "LGPL"
__version__ = "0.2.1"
__maintainer__ = "Kir Ermakov"
__email__ = "isox@vulners.com"
__status__ = "Release"
from __future__ import division
from __init__ import __version__

try:
import urllib.request as urllib2
Expand Down
45 changes: 45 additions & 0 deletions setup.py
@@ -0,0 +1,45 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-

import getsploit
from setuptools import setup

long_description = '''
getsploit
=========
Command line search and download tool for Vulners Database inspired by
searchsploit. It allows you to search online for the exploits across all the
most popular collections: Exploit-DB, Metasploit, Packetstorm and others. The
most powerful feature is immediate exploit source download right in your
working path.
'''

setup(
name='getsploit',
packages=['getsploit'],
version=getsploit.__version__,
description='Command line search and download tool for Vulners Database \
inspired by searchsploit.',
long_description=long_description,
license='LGPLv3',
url='https://github.com/vulnersCom/getsploit',
author=getsploit.__author__,
author_email=getsploit.__email__,
maintainer=getsploit.__maintainer__,
entry_points={
'console_scripts': [
'getsploit = getsploit.getsploit:main',
]
},
classifiers=[
"Development Status :: 5 - Production/Stable",
"Environment :: Console",
"Intended Audience :: Information Technology",
"License :: OSI Approved :: GNU Lesser General Public License v3 (LGPLv3)",
"Programming Language :: Python :: 2.6",
"Programming Language :: Python :: 2.7",
"Programming Language :: Python :: 3.6",
"Topic :: Security",
]
)

0 comments on commit 1db4256

Please sign in to comment.