nixpkgs/pkgs/tools/security/brutespray/default.nix

51 lines
1.2 KiB
Nix
Raw Normal View History

2021-03-01 22:47:23 +01:00
{ lib
, stdenv
, python3
, fetchFromGitHub
, makeWrapper
, medusa
}:
2020-03-07 11:06:00 +01:00
stdenv.mkDerivation rec {
pname = "brutespray";
2021-03-01 22:47:23 +01:00
version = "1.7.0";
2020-03-07 11:06:00 +01:00
src = fetchFromGitHub {
owner = "x90skysn3k";
repo = pname;
2021-03-01 22:47:23 +01:00
rev = "${pname}-${version}";
sha256 = "0lkm3fvx35ml5jh4ykjr2srq8qfajkmxwp4qfcn9xi58khk3asq3";
2020-03-07 11:06:00 +01:00
};
postPatch = ''
substituteInPlace brutespray.py \
--replace "/usr/share/brutespray" "$out/share/brutespray"
'';
dontBuild = true;
nativeBuildInputs = [ python3.pkgs.wrapPython makeWrapper ];
buildInputs = [ python3 ];
installPhase = ''
install -Dm0755 brutespray.py $out/bin/brutespray
patchShebangs $out/bin
patchPythonScript $out/bin/brutespray
wrapProgram $out/bin/brutespray \
2021-01-15 10:19:50 +01:00
--prefix PATH : ${lib.makeBinPath [ medusa ]}
2020-03-07 11:06:00 +01:00
mkdir -p $out/share/brutespray
cp -r wordlist/ $out/share/brutespray/wordlist
'';
meta = with lib; {
2020-03-07 11:06:00 +01:00
homepage = "https://github.com/x90skysn3k/brutespray";
2021-03-01 22:47:23 +01:00
description = "Tool to do brute-forcing from Nmap output";
longDescription = ''
This tool automatically attempts default credentials on found services
directly from Nmap output.
'';
2020-03-07 11:06:00 +01:00
license = licenses.mit;
maintainers = with maintainers; [ ma27 ];
};
}