diff options
Diffstat (limited to 'pkgs/by-name')
-rw-r--r-- | pkgs/by-name/ad/adidnsdump/package.nix | 39 | ||||
-rw-r--r-- | pkgs/by-name/au/autobloody/package.nix | 46 | ||||
-rw-r--r-- | pkgs/by-name/bp/bpftop/package.nix | 6 | ||||
-rw-r--r-- | pkgs/by-name/ca/capslock/package.nix | 37 | ||||
-rw-r--r-- | pkgs/by-name/ce/certificate-ripper/package.nix | 13 | ||||
-rw-r--r-- | pkgs/by-name/ce/certificate-ripper/pin-default-maven-plguin-versions.patch (renamed from pkgs/by-name/ce/certificate-ripper/make-deterministic.patch) | 10 | ||||
-rw-r--r-- | pkgs/by-name/he/hekatomb/package.nix | 49 | ||||
-rw-r--r-- | pkgs/by-name/kr/krbjack/package.nix | 48 | ||||
-rw-r--r-- | pkgs/by-name/pr/pre2k/package.nix | 49 | ||||
-rw-r--r-- | pkgs/by-name/rd/rdwatool/package.nix | 49 | ||||
-rw-r--r-- | pkgs/by-name/sc/scrutiny-collector/package.nix | 2 | ||||
-rw-r--r-- | pkgs/by-name/sc/scrutiny/package.nix | 8 | ||||
-rw-r--r-- | pkgs/by-name/te/tenki/package.nix | 6 | ||||
-rw-r--r-- | pkgs/by-name/tg/tgpt/package.nix | 13 |
14 files changed, 347 insertions, 28 deletions
diff --git a/pkgs/by-name/ad/adidnsdump/package.nix b/pkgs/by-name/ad/adidnsdump/package.nix new file mode 100644 index 000000000000..dc2268d892d9 --- /dev/null +++ b/pkgs/by-name/ad/adidnsdump/package.nix @@ -0,0 +1,39 @@ +{ lib +, fetchFromGitHub +, python3 +}: + +python3.pkgs.buildPythonApplication rec { + pname = "adidnsdump"; + version = "1.3.1-unstable-2023-12-13"; + pyproject = true; + + src = fetchFromGitHub { + owner = "dirkjanm"; + repo = "adidnsdump"; + rev = "8bbb4b05b2d1b792f3c77ce0a4a762ab9e08727d"; + hash = "sha256-dIbnUyV3gdWHHoyzD0ME2fXlMoiQkdrqQ7qQ6Ab6qs0="; + }; + + nativeBuildInputs = with python3.pkgs; [ + setuptools + ]; + + propagatedBuildInputs = with python3.pkgs; [ + impacket + ldap3 + ]; + + pythonImportsCheck = [ + "adidnsdump" + ]; + + meta = with lib; { + description = "Active Directory Integrated DNS dumping by any authenticated user"; + homepage = "https://github.com/dirkjanm/adidnsdump"; + changelog = "https://github.com/dirkjanm/adidnsdump/releases/tag/v${version}"; + license = licenses.mit; + maintainers = with maintainers; [ fab ]; + mainProgram = "adidnsdump"; + }; +} diff --git a/pkgs/by-name/au/autobloody/package.nix b/pkgs/by-name/au/autobloody/package.nix new file mode 100644 index 000000000000..c55689350211 --- /dev/null +++ b/pkgs/by-name/au/autobloody/package.nix @@ -0,0 +1,46 @@ +{ lib +, python3 +, fetchFromGitHub +}: + +python3.pkgs.buildPythonApplication rec { + pname = "autobloody"; + version = "0.1.8"; + pyproject = true; + + src = fetchFromGitHub { + owner = "CravateRouge"; + repo = "autobloody"; + rev = "refs/tags/v${version}"; + hash = "sha256-0MwhdT9GYLcrdZSqszx1DC9lyz8K61lJZZCzeFfWB0E="; + }; + + nativeBuildInputs = with python3.pkgs; [ + hatchling + ]; + + propagatedBuildInputs = with python3.pkgs; [ + bloodyad + neo4j + ]; + + # Tests require a test file which is not available in the current release + doCheck = false; + + nativeCheckInputs = with python3.pkgs; [ + pytestCheckHook + ]; + + pythonImportsCheck = [ + "autobloody" + ]; + + meta = with lib; { + description = "Tool to automatically exploit Active Directory privilege escalation paths"; + homepage = "https://github.com/CravateRouge/autobloody"; + changelog = "https://github.com/CravateRouge/autobloody/releases/tag/v${version}"; + license = licenses.mit; + maintainers = with maintainers; [ fab ]; + mainProgram = "autobloody"; + }; +} diff --git a/pkgs/by-name/bp/bpftop/package.nix b/pkgs/by-name/bp/bpftop/package.nix index 7a87f202a65e..db954a57e069 100644 --- a/pkgs/by-name/bp/bpftop/package.nix +++ b/pkgs/by-name/bp/bpftop/package.nix @@ -9,16 +9,16 @@ rustPlatform.buildRustPackage rec { pname = "bpftop"; - version = "0.2.3"; + version = "0.3.0"; src = fetchFromGitHub { owner = "Netflix"; repo = "bpftop"; rev = "v${version}"; - hash = "sha256-mtif1VRlDL1LsJQ3NQmBEaHTxrt2qMbZAFCEhtm/CtI="; + hash = "sha256-5MrfnKbrL8VoQBhtIcNmbkUfdjBXhTUW3d0GypvCuY8="; }; - cargoHash = "sha256-N3pmet7OkIaI3EnzHfqe5P24RHabNUArEB1cKUYM5rA="; + cargoHash = "sha256-OjbsnhAY9KrGWgTDb3cxa1NIbdY2eaWlDXINC15Qk98="; buildInputs = [ elfutils diff --git a/pkgs/by-name/ca/capslock/package.nix b/pkgs/by-name/ca/capslock/package.nix new file mode 100644 index 000000000000..87da681fe958 --- /dev/null +++ b/pkgs/by-name/ca/capslock/package.nix @@ -0,0 +1,37 @@ +{ lib +, buildGoModule +, fetchFromGitHub +}: + +buildGoModule rec { + pname = "capslock"; + version = "0.1.1"; + + src = fetchFromGitHub { + owner = "google"; + repo = "capslock"; + rev = "v${version}"; + hash = "sha256-mGrq43YCjF137c5ynQxL7IXDCUbnbBLv5E0tw/boObE="; + }; + + vendorHash = "sha256-WTbHcVARbz7cvAY7IZnACTrN5h9NXWXfxxEWq4hssOM="; + + subPackages = [ + "cmd/capslock" + ]; + + CGO_ENABLED = "0"; + + ldflags = [ + "-s" + "-w" + ]; + + meta = with lib; { + description = "Capability analysis CLI for Go packages that informs users of which privileged operations a given package can access"; + homepage = "https://github.com/google/capslock"; + license = licenses.bsd3; + mainProgram = "capslock"; + maintainers = with maintainers; [ katexochen ]; + }; +} diff --git a/pkgs/by-name/ce/certificate-ripper/package.nix b/pkgs/by-name/ce/certificate-ripper/package.nix index 0b03b395789f..439d8079d764 100644 --- a/pkgs/by-name/ce/certificate-ripper/package.nix +++ b/pkgs/by-name/ce/certificate-ripper/package.nix @@ -6,7 +6,7 @@ let pname = "certificate-ripper"; - version = "2.2.0"; + version = "2.3.0"; jar = maven.buildMavenPackage { pname = "${pname}-jar"; @@ -16,15 +16,20 @@ let owner = "Hakky54"; repo = "certificate-ripper"; rev = version; - hash = "sha256-snavZVLY8sHinLnG6k61eSQlR9sb8+k5tRHqu4kzQKM="; + hash = "sha256-q/UhKLFAre3YUH2W7e+SH4kRM0GIZAUyNJFDm02eL+8="; }; patches = [ - ./make-deterministic.patch + ./pin-default-maven-plguin-versions.patch ./fix-test-temp-dir-path.patch ]; - mvnHash = "sha256-ahw9VVlvBPlWChcJzXFna55kxqVeJMmdaLtwWcJ+qSA="; + mvnHash = "sha256-/iy7DXBAyq8TIpvrd2WAQh+9OApfxCWo1NoGwbzbq7s="; + + mvnParameters = lib.escapeShellArgs [ + "-Dproject.build.outputTimestamp=1980-01-01T00:00:02Z" # make timestamp deterministic + "-Dtest=!PemExportCommandShould#resolveRootCaOnlyWhenEnabled" # disable test using network + ]; installPhase = '' install -Dm644 target/crip.jar $out diff --git a/pkgs/by-name/ce/certificate-ripper/make-deterministic.patch b/pkgs/by-name/ce/certificate-ripper/pin-default-maven-plguin-versions.patch index b9e7aa1d0a1e..bce8fab057a7 100644 --- a/pkgs/by-name/ce/certificate-ripper/make-deterministic.patch +++ b/pkgs/by-name/ce/certificate-ripper/pin-default-maven-plguin-versions.patch @@ -2,15 +2,7 @@ diff --git a/pom.xml b/pom.xml index dd0075d..46ac184 100644 --- a/pom.xml +++ b/pom.xml -@@ -46,6 +46,7 @@ - <version.license-maven-plugin>4.2.rc3</version.license-maven-plugin> - <license.git.copyrightYears>2021</license.git.copyrightYears> - <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding> -+ <project.build.outputTimestamp>1980-01-01T00:00:02Z</project.build.outputTimestamp> - </properties> - - <scm> -@@ -103,6 +104,55 @@ +@@ -103,6 +103,55 @@ <build> <plugins> diff --git a/pkgs/by-name/he/hekatomb/package.nix b/pkgs/by-name/he/hekatomb/package.nix new file mode 100644 index 000000000000..1d9df3a03215 --- /dev/null +++ b/pkgs/by-name/he/hekatomb/package.nix @@ -0,0 +1,49 @@ +{ lib +, python3 +, fetchFromGitHub +}: + +python3.pkgs.buildPythonApplication rec { + pname = "hekatomb"; + version = "1.5.14-unstable-2024-02-14"; + pyproject = true; + + src = fetchFromGitHub { + owner = "ProcessusT"; + repo = "HEKATOMB"; + rev = "8cd372fd5d93e8b43c2cbe2ab2cada635f00e9dd"; + hash = "sha256-2juP2SuCfY4z2J27BlodrsP+29BjGxKDIDOW0mmwCPY="; + }; + + pythonRelaxDeps = [ + "impacket" + ]; + + nativeBuildInputs = with python3.pkgs; [ + poetry-core + pythonRelaxDepsHook + ]; + + propagatedBuildInputs = with python3.pkgs; [ + chardet + dnspython + impacket + ldap3 + pycryptodomex + ]; + + # Project has no tests + doCheck = false; + + pythonImportsCheck = [ + "hekatomb" + ]; + + meta = with lib; { + description = "Tool to connect to LDAP directory to retrieve informations"; + homepage = "https://github.com/ProcessusT/HEKATOMB"; + license = licenses.gpl3Only; + maintainers = with maintainers; [ fab ]; + mainProgram = "hekatomb"; + }; +} diff --git a/pkgs/by-name/kr/krbjack/package.nix b/pkgs/by-name/kr/krbjack/package.nix new file mode 100644 index 000000000000..59a58f289b00 --- /dev/null +++ b/pkgs/by-name/kr/krbjack/package.nix @@ -0,0 +1,48 @@ +{ lib +, fetchFromGitHub +, python3 +}: + +python3.pkgs.buildPythonApplication rec { + pname = "krbjack"; + version = "0-unstable-2024-02-08"; + pyproject = true; + + src = fetchFromGitHub { + owner = "almandin"; + repo = "krbjack"; + rev = "0abaf7039c11fe735120c44a9420a311b42f7551"; + hash = "sha256-rvK0I8WlXqJtau9f+6ximfzYCjX21dPIyDN56IMI0gE="; + }; + + pythonRelaxDeps = [ + "impacket" + ]; + + nativeBuildInputs = with python3.pkgs; [ + poetry-core + pythonRelaxDepsHook + ]; + + propagatedBuildInputs = with python3.pkgs; [ + colorama + dnspython + impacket + scapy + ]; + + # Project has no tests + doCheck = false; + + pythonImportsCheck = [ + "krbjack" + ]; + + meta = with lib; { + description = "Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse"; + homepage = "https://github.com/almandin/krbjack"; + license = licenses.beerware; + maintainers = with maintainers; [ fab ]; + mainProgram = "krbjack"; + }; +} diff --git a/pkgs/by-name/pr/pre2k/package.nix b/pkgs/by-name/pr/pre2k/package.nix new file mode 100644 index 000000000000..59353d9806ed --- /dev/null +++ b/pkgs/by-name/pr/pre2k/package.nix @@ -0,0 +1,49 @@ +{ lib +, fetchFromGitHub +, python3 +}: + +python3.pkgs.buildPythonApplication rec { + pname = "pre2k"; + version = "3.0-unstable-2024-03-14"; + pyproject = true; + + src = fetchFromGitHub { + owner = "garrettfoster13"; + repo = "pre2k"; + rev = "3baa7b73aedd45f52e417210081da3dd010c1b22"; + hash = "sha256-0lgH7Z9LuiZwODdFvKWcqS1TV02aVjzD9RgOhX0lU6s="; + }; + + pythonRelaxDeps = [ + "impacket" + "pyasn1" + "rich" + "typer" + ]; + + nativeBuildInputs = with python3.pkgs; [ + poetry-core + pythonRelaxDepsHook + ]; + + propagatedBuildInputs = with python3.pkgs; [ + impacket + ldap3 + pyasn1 + rich + typer + ]; + + pythonImportsCheck = [ + "pre2k" + ]; + + meta = with lib; { + description = "Tool to query for the existence of pre-windows 2000 computer objects"; + homepage = "https://github.com/garrettfoster13/pre2k"; + license = licenses.mit; + maintainers = with maintainers; [ fab ]; + mainProgram = "pre2k"; + }; +} diff --git a/pkgs/by-name/rd/rdwatool/package.nix b/pkgs/by-name/rd/rdwatool/package.nix new file mode 100644 index 000000000000..49459eb39a9e --- /dev/null +++ b/pkgs/by-name/rd/rdwatool/package.nix @@ -0,0 +1,49 @@ +{ lib +, fetchFromGitHub +, python3 +}: + +python3.pkgs.buildPythonApplication rec { + pname = "rdwatool"; + version = "1.2-unstable-2023-11-27"; + pyproject = true; + + src = fetchFromGitHub { + owner = "p0dalirius"; + repo = "RDWAtool"; + rev = "60b7816f06d155bd3d218b76b69d9419b8a82dbe"; + hash = "sha256-0mjnZiF8DxVbI8Lr12b7jzn+x+mn6Mel8LaIy8heEdI="; + }; + + pythonRelaxDeps = [ + "urllib3" + ]; + + pythonRemoveDeps = [ + "bs4" + ]; + + nativeBuildInputs = with python3.pkgs; [ + pythonRelaxDepsHook + setuptools + ]; + + propagatedBuildInputs = with python3.pkgs; [ + beautifulsoup4 + requests + urllib3 + xlsxwriter + ]; + + pythonImportsCheck = [ + "rdwatool" + ]; + + meta = with lib; { + description = "Tool to extract information from a Microsoft Remote Desktop Web Access (RDWA) application"; + homepage = "https://github.com/p0dalirius/RDWAtool"; + license = licenses.gpl2Only; + maintainers = with maintainers; [ fab ]; + mainProgram = "rdwatool"; + }; +} diff --git a/pkgs/by-name/sc/scrutiny-collector/package.nix b/pkgs/by-name/sc/scrutiny-collector/package.nix index bebf43638dc3..984a52b21405 100644 --- a/pkgs/by-name/sc/scrutiny-collector/package.nix +++ b/pkgs/by-name/sc/scrutiny-collector/package.nix @@ -4,6 +4,7 @@ , smartmontools , nixosTests , lib +, nix-update-script }: let version = "0.8.0"; @@ -41,6 +42,7 @@ buildGoModule rec { ''; passthru.tests.scrutiny-collector = nixosTests.scrutiny; + passthru.updateScript = nix-update-script { }; meta = { description = "Hard disk metrics collector for Scrutiny."; diff --git a/pkgs/by-name/sc/scrutiny/package.nix b/pkgs/by-name/sc/scrutiny/package.nix index 0abe624af53d..34712b96e431 100644 --- a/pkgs/by-name/sc/scrutiny/package.nix +++ b/pkgs/by-name/sc/scrutiny/package.nix @@ -3,16 +3,17 @@ , fetchFromGitHub , nixosTests , lib +, nix-update-script }: let pname = "scrutiny"; - version = "0.7.3"; + version = "0.8.0"; src = fetchFromGitHub { owner = "AnalogJ"; repo = "scrutiny"; rev = "refs/tags/v${version}"; - hash = "sha256-S7GW8z6EWB+5vntKew0+EDVqhun+Ae2//15dSIlfoSs="; + hash = "sha256-ysjE2nn1WwhEiFIvJ5cRCJQf9mECTgiGUyenwf3mKTA="; }; frontend = buildNpmPackage { @@ -35,6 +36,8 @@ let cp -r dist/* $out runHook postInstall ''; + + passthru.updatescript = nix-update-script { }; }; in buildGoModule rec { @@ -56,6 +59,7 @@ buildGoModule rec { ''; passthru.tests.scrutiny = nixosTests.scrutiny; + passthru.updatescript = nix-update-script { }; meta = { description = "Hard Drive S.M.A.R.T Monitoring, Historical Trends & Real World Failure Thresholds."; diff --git a/pkgs/by-name/te/tenki/package.nix b/pkgs/by-name/te/tenki/package.nix index e00d27eca21c..35ee53a41376 100644 --- a/pkgs/by-name/te/tenki/package.nix +++ b/pkgs/by-name/te/tenki/package.nix @@ -4,16 +4,16 @@ }: rustPlatform.buildRustPackage rec { pname = "tenki"; - version = "1.4.0"; + version = "1.5.0"; src = fetchFromGitHub { owner = "ckaznable"; repo = "tenki"; rev = "v${version}"; - hash = "sha256-64yNMO+Tm8APF2NnygQuub4z7kCxxf+T1urgA4Qs104="; + hash = "sha256-X/GnOgxwBhkrdhUmEhyxdgk5ElayMOAmtDxR2cqRJc8="; }; - cargoHash = "sha256-R6Bfk3kW8721Q++dSY4u7AbUukBT0PODfFXsXuugWdk="; + cargoHash = "sha256-rmMUVZwNouUvFFPgZfbR4sgtig5zx1WC3bxnfPPT3yQ="; meta = with lib; { description = "tty-clock with weather effect"; diff --git a/pkgs/by-name/tg/tgpt/package.nix b/pkgs/by-name/tg/tgpt/package.nix index 5846639beb07..d63ff34c21d3 100644 --- a/pkgs/by-name/tg/tgpt/package.nix +++ b/pkgs/by-name/tg/tgpt/package.nix @@ -1,18 +1,17 @@ { lib , buildGoModule , fetchFromGitHub -, nix-update-script }: buildGoModule rec { pname = "tgpt"; - version = "2.7.1"; + version = "2.7.2"; src = fetchFromGitHub { owner = "aandrew-me"; repo = "tgpt"; rev = "refs/tags/v${version}"; - hash = "sha256-XuTDEcs1wIrAe7Oaok4aFP01jDcyWB01R3HNrx6UEpo="; + hash = "sha256-FbnweHiKfxqFegZnRlvdVbTmH4ImjddVOBlbGRT/SGw="; }; vendorHash = "sha256-docq/r6yyMPsuUyFbtCMaYfEVL0gLmyTy4PbrAemR00="; @@ -22,10 +21,10 @@ buildGoModule rec { "-w" ]; - # test tries to access the network - doCheck = false; - - passthru.updateScript = nix-update-script { }; + preCheck = '' + # Remove test which need network access + rm providers/koboldai/koboldai_test.go + ''; meta = with lib; { description = "ChatGPT in terminal without needing API keys"; |