Port details |
- ratproxy Semi-automated, largely passive web application security audit tool
- 1.58 security
=2 1.58Version of this port present on the latest quarterly branch. - Maintainer: skreuzer@FreeBSD.org
 - Port Added: 2008-07-08 21:35:48
- Last Update: 2021-04-06 14:31:07
- Commit Hash: 305f148
- People watching this port, also watch:: ncrack, mkvtoolnix, tcpdump, magicrescue, coreutils
- License: not specified in port
- Description:
- Ratproxy is a semi-automated, largely passive web application security audit
tool. It is meant to complement active crawlers and manual proxies more
commonly used for this task, and is optimized specifically for an accurate and
sensitive detection, and automatic annotation, of potential problems and
security-relevant design patterns based on the observation of existing,
user-initiated traffic in complex web 2.0 environments.
WWW: https://github.com/codenote/ratproxy
- SVNWeb : git : Homepage
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- ratproxy>0:security/ratproxy
- To install the port:
- cd /usr/ports/security/ratproxy/ && make install clean
- To add the package, run one of these commands:
- pkg install security/ratproxy
- pkg install ratproxy
- PKGNAME: ratproxy
- Flavors: there is no flavor information for this port.
- distinfo:
- SHA256 (ratproxy-1.58.tar.gz) = 2142d5643305713d9be7fcc82a244048076190851e697b645c49b549a7ae0725
SIZE (ratproxy-1.58.tar.gz) = 168700
- Packages (timestamps in pop-ups are UTC):
- There are no ports dependent upon this port
- Configuration Options:
- No options to configure
- Options name:
- security_ratproxy
- USES:
- shebangfix ssl
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
|
Commit History - (may be incomplete: see SVNWeb link above for full details) |
Date | By | Description |
06 Apr 2021 14:31:07 1.58
|
Mathieu Arnold (mat)  |
Remove # $FreeBSD$ from Makefiles. |
18 Sep 2020 01:07:46
1.58
|
skreuzer  |
Fix build with -fno-common |
23 Jan 2017 15:47:38
1.58
|
skreuzer  |
Update MASTER_SITES |
14 Sep 2016 15:59:34
1.58
|
mat  |
GOOGLE_CODE has gone away.
- If a port has another upstream, remove GOOGLE_CODE
- If a port only has GOOGLE_CODE mark it BROKEN
Some ports have a local mirror configured but for security reasons, it
is not considered upstream.
Sponsored by: Absolight |
11 Sep 2016 05:00:56
1.58
|
marino  |
security/ratproxy: Add SSL flags and honor them
Approved by: SSL blanket |
25 Feb 2014 12:18:13
1.58
|
ehaupt  |
Support staging |
20 Sep 2013 22:55:26
1.58
|
bapt  |
Add NO_STAGE all over the place in preparation for the staging support (cat:
security) |
03 Jul 2011 14:03:52
1.58
|
ohauer  |
-remove MD5 |
27 May 2009 16:54:33
1.58
|
skreuzer  |
Update to 1.58
Approved by: wxs (mentor) |
28 Mar 2009 01:16:37
1.51
|
skreuzer  |
Change MAINTAINER on my ports to my FreeBSD email address
Approved by: wxs (mentor) |
08 Jul 2008 21:35:23
1.51
|
pav  |
Ratproxy is a semi-automated, largely passive web application security audit
tool. It is meant to complement active crawlers and manual proxies more
commonly used for this task, and is optimized specifically for an accurate and
sensitive detection, and automatic annotation, of potential problems and
security-relevant design patterns based on the observation of existing,
user-initiated traffic in complex web 2.0 environments.
WWW: http://code.google.com/p/ratproxy/
PR: ports/125249
Submitted by: Steven Kreuzer <skreuzer@exit2shell.com> |