Name: wfuzz Version: 1.4c Release: %mkrel 3 Summary: The web bruteforcer License: GPL Group: Monitoring URL: http://www.edge-security.com/wfuzz.php Source: http://www.edge-security.com/soft/wfuzz-%{version}.tar.bz2 Patch0: wfuzz-1.4-fhs.patch Requires: python-curl BuildArch: noarch %description Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc. %prep %setup -q -n %{name} %patch0 -p 1 chmod 644 COPYING LICENSES README %build %install rm -rf %{buildroot} install -d -m 755 %{buildroot}%{_bindir} install -d -m 755 %{buildroot}%{_datadir}/wfuzz/lib install -m 755 wfuzz.py %{buildroot}%{_bindir} install -m 644 *.py %{buildroot}%{_datadir}/wfuzz/lib rm -f %{buildroot}%{_datadir}/wfuzz/lib/wfuzz.py cp -pr wordlist %{buildroot}%{_datadir}/wfuzz %clean rm -rf %{buildroot} %files %defattr(-,root,root) %doc COPYING LICENSES README %{_bindir}/wfuzz.py %{_datadir}/wfuzz %changelog * Mon Jan 14 2013 umeabot <umeabot> 1.4c-3.mga3 + Revision: 385685 - Mass Rebuild - https://wiki.mageia.org/en/Feature:Mageia3MassRebuild * Wed Jul 20 2011 guillomovitch <guillomovitch> 1.4c-2.mga2 + Revision: 127284 - fix group * Tue Jul 19 2011 guillomovitch <guillomovitch> 1.4c-1.mga2 + Revision: 126459 - imported package wfuzz