-
Notifications
You must be signed in to change notification settings - Fork 38
/
make_exe.py
118 lines (111 loc) · 3.91 KB
/
make_exe.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
#!/usr/bin/env python
# Don't use this script unless you know exactly what you are doing !
from distutils.core import setup
import py2exe
import os
import sys
# dirty hack so we don't have to give any argument
if "py2exe" not in sys.argv:
sys.argv.append("py2exe")
VERSION = "2.3.0"
# Build file lists
def build_file_list(results, dest, root, src=""):
cwd = os.getcwd()
if src != "":
os.chdir(src)
for root, dirs, files in os.walk(root):
if ".svn" in dirs:
dirs.remove(".svn")
if files:
results.append((os.path.join(dest, root), [os.path.join(src, root, x) for x in files]))
os.chdir(cwd)
data_files = [("data",
["INSTALL",
"README",
"TODO",
"VERSION"])]
build_file_list(data_files, "data", "doc", src="")
build_file_list(data_files, "data", "config", src="wapitiCore")
build_file_list(data_files, "data", "report_template", src="wapitiCore")
build_file_list(data_files, "data", "language_sources", src="wapitiCore")
# Main
setup(
name="wapiti",
version=VERSION,
description="A web application vulnerability scanner",
long_description="""\
Wapiti allows you to audit the security of your web applications.
It performs "black-box" scans, i.e. it does not study the source code of the
application but will scans the webpages of the deployed webapp, looking for
scripts and forms where it can inject data.
Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see
if a script is vulnerable.""",
url="http://wapiti.sourceforge.net/",
author="Nicolas SURRIBAS",
author_email="nicolas.surribas@gmail.com",
license="GPLv2",
platforms=["Any"],
packages=[
'wapitiCore',
'wapitiCore.attack',
'wapitiCore.language',
'wapitiCore.report',
'wapitiCore.net',
'wapitiCore.file',
'wapitiCore.net.jsparser'
],
data_files=data_files,
console=[
{
"script": "bin/wapiti",
"icon_resources": [(1, "doc/wapiti.ico")]
},
{
"script": "bin/wapiti-cookie",
"icon_resources": [(1, "doc/cookie.ico")]
},
{
"script": "bin/wapiti-getcookie",
"icon_resources": [(1, "doc/cookie.ico")]
}
],
classifiers=[
'Development Status :: 5 - Production/Stable',
'Environment :: Console',
'Intended Audience :: End Users/Desktop',
'Intended Audience :: Developers',
'Intended Audience :: System Administrators',
'License :: OSI Approved :: GNU General Public License (GPL)',
'Operating System :: MacOS :: MacOS X',
'Operating System :: Microsoft :: Windows',
'Operating System :: POSIX',
'Operating System :: Unix',
'Programming Language :: Python',
'Topic :: Security',
'Topic :: Internet :: WWW/HTTP :: Indexing/Search',
'Topic :: Software Development :: Testing'
],
options={
"py2exe": {
"includes": [
"wapitiCore.attack.mod_backup",
"wapitiCore.attack.mod_blindsql",
"wapitiCore.attack.mod_crlf",
"wapitiCore.attack.mod_exec",
"wapitiCore.attack.mod_file",
"wapitiCore.attack.mod_htaccess",
"wapitiCore.attack.mod_nikto",
"wapitiCore.attack.mod_permanentxss",
"wapitiCore.attack.mod_sql",
"wapitiCore.attack.mod_xss",
"wapitiCore.report.reportgenerator",
"wapitiCore.report.htmlreportgenerator",
"wapitiCore.report.jsonreportgenerator",
"wapitiCore.report.openvasreportgenerator",
"wapitiCore.report.txtreportgenerator",
"wapitiCore.report.vulneranetxmlreportgenerator",
"wapitiCore.report.xmlreportgenerator"
]
}
}
)