blob: 6398bf0cf331453c4ecc1205753c168c4818de58 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
|
# Maintainer: 0xMew <hacker@localhost>
pkgname=0xmew-toolkit
pkgver=3.6
pkgrel=2
pkgdesc="Advanced Network Attack Toolkit by 0xMew (ARP Spoof, Kill, SNI Spy)"
arch=('any')
url="https://github.com/0xMewhx/0xMew-toolkit"
license=('MIT')
depends=('python' 'tcpdump' 'ethtool' 'macchanger' 'python-scapy' 'python-cryptography' 'nmap' 'aircrack-ng' 'wireless_tools')
source=("${pkgname}-${pkgver}.tar.gz::${url}/archive/refs/tags/v${pkgver}.tar.gz")
sha256sums=('3b310c1836957ba0d7c9e257b2dff73a6451a8dc178da3bbebfb8d9522b9fc04')
package() {
cd "0xMew-toolkit-${pkgver}"
# 1. Создаем папку в /opt/
install -d "$pkgdir/opt/$pkgname"
# 2. Копируем скрипт
install -m755 wow.py "$pkgdir/opt/$pkgname/wow.py"
# 3. Создаем лаунчер в /usr/bin/
install -d "$pkgdir/usr/bin"
# Пишем скрипт запуска прямо в пакет
echo "#!/bin/bash" > "$pkgdir/usr/bin/$pkgname"
echo "if [ \"\$EUID\" -ne 0 ]; then" >> "$pkgdir/usr/bin/$pkgname"
echo " exec sudo /usr/bin/python /opt/$pkgname/wow.py \"\$@\"" >> "$pkgdir/usr/bin/$pkgname"
echo "else" >> "$pkgdir/usr/bin/$pkgname"
echo " exec /usr/bin/python /opt/$pkgname/wow.py \"\$@\"" >> "$pkgdir/usr/bin/$pkgname"
echo "fi" >> "$pkgdir/usr/bin/$pkgname"
# Делаем лаунчер исполняемым
chmod 755 "$pkgdir/usr/bin/$pkgname"
}
|