|
3 | 3 | "description": "(Scoop bucket by arch3rpro) getsploit - Command line utility for searching and downloading exploits.", |
4 | 4 | "homepage": "https://github.com/vulnersCom/getsploit", |
5 | 5 | "license": "LGPL-3.0", |
6 | | - "suggest": "Python3", |
| 6 | + "suggest": "Python3 Pipx", |
7 | 7 | "url": "https://github.com/vulnersCom/getsploit/archive/refs/tags/1.0.0.zip", |
8 | 8 | "hash": "21b416e963ece95f8e47686481c0b3cc77f312b1cd57d00b397e16040fbd1737", |
9 | 9 | "extract_dir": "getsploit-1.0.0", |
10 | | - "pre_install": [ |
11 | | - "if (Test-Path \"$dir\\venv\\Scripts\\deactivate.bat\") {", |
12 | | - " Write-Host 'Deactivating existing virtual environment...';", |
13 | | - " & \"$dir\\venv\\Scripts\\deactivate.bat\"", |
14 | | - "}", |
15 | | - "if (Test-Path \"$dir\\venv\") {", |
16 | | - " Write-Host 'Removing existing virtual environment...';", |
17 | | - " Remove-Item -Recurse -Force \"$dir\\venv\"", |
18 | | - "}", |
19 | | - "Set-Content \"$dir\\getsploit.bat\" '@echo off\npushd %~dp0\ncall \"%~dp0\\venv\\Scripts\\activate.bat\"\ngetsploit %*\npopd' -Encoding Ascii" |
20 | | - ], |
21 | | - "post_install": [ |
22 | | - "python3 -m venv \"$dir\\venv\"", |
23 | | - "& \"$dir\\venv\\Scripts\\activate\"", |
24 | | - "pip3 install getsploit" |
25 | | - ], |
26 | | - "bin": "getsploit.bat", |
| 10 | + "post_install": "pipx install getsploit", |
| 11 | + "bin": "getsploit.exe", |
27 | 12 | "checkver": { |
28 | 13 | "url": "https://api.github.com/repos/vulnersCom/getsploit/releases", |
29 | 14 | "regex": "tag_name\":\\s*\"v?(\\d+\\.\\d+\\.\\d+)\"" |
|
0 commit comments