nixpkgs/pkgs/tools/security/theharvester/default.nix

37 lines
1.3 KiB
Nix
Raw Normal View History

{ lib, fetchFromGitHub, python3 }:
2018-02-09 09:00:15 +00:00
python3.pkgs.buildPythonApplication rec {
2018-02-09 09:00:15 +00:00
pname = "theHarvester";
version = "3.1";
2018-02-09 09:00:15 +00:00
src = fetchFromGitHub {
owner = "laramies";
2019-05-19 17:50:11 +01:00
repo = pname;
rev = "V${version}";
sha256 = "0lxzxfa9wbzim50d2jmd27i57szd0grm1dfayhnym86jn01qpvn3";
2018-02-09 09:00:15 +00:00
};
propagatedBuildInputs = with python3.pkgs; [
aiodns beautifulsoup4 dns grequests netaddr
plotly pyyaml requests retrying shodan texttable
];
2018-02-09 09:00:15 +00:00
checkInputs = [ python3.pkgs.pytest ];
2018-02-09 09:00:15 +00:00
checkPhase = "runHook preCheck ; pytest tests/test_myparser.py ; runHook postCheck";
# We don't run other tests (discovery modules) because they require network access
2018-02-09 09:00:15 +00:00
meta = with lib; {
2018-02-09 09:00:15 +00:00
description = "Gather E-mails, subdomains and names from different public sources";
longDescription = ''
theHarvester is a very simple, yet effective tool designed to be used in the early
stages of a penetration test. Use it for open source intelligence gathering and
helping to determine an entity's external threat landscape on the internet. The tool
gathers emails, names, subdomains, IPs, and URLs using multiple public data sources.
'';
2018-02-09 09:00:15 +00:00
homepage = "https://github.com/laramies/theHarvester";
maintainers = with maintainers; [ c0bw3b treemo ];
2018-02-09 09:00:15 +00:00
license = licenses.gpl2;
};
}