aboutsummarylogtreecommitdiffstats
path: root/PKGBUILD
blob: 6398bf0cf331453c4ecc1205753c168c4818de58 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
# Maintainer: 0xMew <hacker@localhost>
pkgname=0xmew-toolkit
pkgver=3.6
pkgrel=2
pkgdesc="Advanced Network Attack Toolkit by 0xMew (ARP Spoof, Kill, SNI Spy)"
arch=('any')
url="https://github.com/0xMewhx/0xMew-toolkit"
license=('MIT')
depends=('python' 'tcpdump' 'ethtool' 'macchanger' 'python-scapy' 'python-cryptography' 'nmap' 'aircrack-ng' 'wireless_tools')
source=("${pkgname}-${pkgver}.tar.gz::${url}/archive/refs/tags/v${pkgver}.tar.gz")
sha256sums=('3b310c1836957ba0d7c9e257b2dff73a6451a8dc178da3bbebfb8d9522b9fc04')

package() {
    cd "0xMew-toolkit-${pkgver}"

    # 1. Создаем папку в /opt/
    install -d "$pkgdir/opt/$pkgname"

    # 2. Копируем скрипт
    install -m755 wow.py "$pkgdir/opt/$pkgname/wow.py"

    # 3. Создаем лаунчер в /usr/bin/
    install -d "$pkgdir/usr/bin"

    # Пишем скрипт запуска прямо в пакет
    echo "#!/bin/bash" > "$pkgdir/usr/bin/$pkgname"
    echo "if [ \"\$EUID\" -ne 0 ]; then" >> "$pkgdir/usr/bin/$pkgname"
    echo "    exec sudo /usr/bin/python /opt/$pkgname/wow.py \"\$@\"" >> "$pkgdir/usr/bin/$pkgname"
    echo "else" >> "$pkgdir/usr/bin/$pkgname"
    echo "    exec /usr/bin/python /opt/$pkgname/wow.py \"\$@\"" >> "$pkgdir/usr/bin/$pkgname"
    echo "fi" >> "$pkgdir/usr/bin/$pkgname"

    # Делаем лаунчер исполняемым
    chmod 755 "$pkgdir/usr/bin/$pkgname"
}