Port details |
- ratproxy Semi-automated, largely passive web application security audit tool
- 1.58 security =5 1.58Version of this port present on the latest quarterly branch.
- Maintainer: skreuzer@FreeBSD.org
- Port Added: 2008-07-08 21:35:48
- Last Update: 2022-09-07 21:58:51
- Commit Hash: fb16dfe
- People watching this port, also watch:: testdisk, ncrack, pftop, hashcat, dfc
- License: not specified in port
- WWW:
- https://github.com/codenote/ratproxy
- Description:
- Ratproxy is a semi-automated, largely passive web application security audit
tool. It is meant to complement active crawlers and manual proxies more
commonly used for this task, and is optimized specifically for an accurate and
sensitive detection, and automatic annotation, of potential problems and
security-relevant design patterns based on the observation of existing,
user-initiated traffic in complex web 2.0 environments.
- ¦ ¦ ¦ ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- ratproxy>0:security/ratproxy
- To install the port:
- cd /usr/ports/security/ratproxy/ && make install clean
- To add the package, run one of these commands:
- pkg install security/ratproxy
- pkg install ratproxy
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: ratproxy
- Flavors: there is no flavor information for this port.
- distinfo:
- SHA256 (ratproxy-1.58.tar.gz) = 2142d5643305713d9be7fcc82a244048076190851e697b645c49b549a7ae0725
SIZE (ratproxy-1.58.tar.gz) = 168700
Packages (timestamps in pop-ups are UTC):
- This port has no dependencies.
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- security_ratproxy
- USES:
- shebangfix ssl
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
|
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
07 Sep 2022 21:58:51 |
Stefan Eßer (se) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
1.58 07 Sep 2022 21:10:59 |
Stefan Eßer (se) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
1.58 20 Jul 2022 14:22:56 |
Tobias C. Berner (tcberner) |
security: remove 'Created by' lines
A big Thank You to the original contributors of these ports:
* <ports@c0decafe.net>
* Aaron Dalton <aaron@FreeBSD.org>
* Adam Weinberger <adamw@FreeBSD.org>
* Ade Lovett <ade@FreeBSD.org>
* Aldis Berjoza <aldis@bsdroot.lv>
* Alex Dupre <ale@FreeBSD.org>
* Alex Kapranoff <kappa@rambler-co.ru>
* Alex Samorukov <samm@freebsd.org>
* Alexander Botero-Lowry <alex@foxybanana.com>
* Alexander Kriventsov <avk@vl.ru>
* Alexander Leidinger <netchild@FreeBSD.org> (Only the first 15 lines of the commit message are shown above ) |
1.58 06 Apr 2021 14:31:07 |
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles. |
1.58 18 Sep 2020 01:07:46 |
skreuzer |
Fix build with -fno-common |
1.58 23 Jan 2017 15:47:38 |
skreuzer |
Update MASTER_SITES |
1.58 14 Sep 2016 15:59:34 |
mat |
GOOGLE_CODE has gone away.
- If a port has another upstream, remove GOOGLE_CODE
- If a port only has GOOGLE_CODE mark it BROKEN
Some ports have a local mirror configured but for security reasons, it
is not considered upstream.
Sponsored by: Absolight |
1.58 11 Sep 2016 05:00:56 |
marino |
security/ratproxy: Add SSL flags and honor them
Approved by: SSL blanket |
1.58 25 Feb 2014 12:18:13 |
ehaupt |
Support staging |
1.58 20 Sep 2013 22:55:26 |
bapt |
Add NO_STAGE all over the place in preparation for the staging support (cat:
security) |
1.58 03 Jul 2011 14:03:52 |
ohauer |
-remove MD5 |
1.58 27 May 2009 16:54:33 |
skreuzer |
Update to 1.58
Approved by: wxs (mentor) |
1.51 28 Mar 2009 01:16:37 |
skreuzer |
Change MAINTAINER on my ports to my FreeBSD email address
Approved by: wxs (mentor) |
1.51 08 Jul 2008 21:35:23 |
pav |
Ratproxy is a semi-automated, largely passive web application security audit
tool. It is meant to complement active crawlers and manual proxies more
commonly used for this task, and is optimized specifically for an accurate and
sensitive detection, and automatic annotation, of potential problems and
security-relevant design patterns based on the observation of existing,
user-initiated traffic in complex web 2.0 environments.
WWW: http://code.google.com/p/ratproxy/
PR: ports/125249
Submitted by: Steven Kreuzer <skreuzer@exit2shell.com> |