From d52294c6f6b186ff3bb2b3e4dcdf5631fe3a0246 Mon Sep 17 00:00:00 2001 From: Todd Leonhardt Date: Wed, 11 Jun 2025 17:15:35 -0400 Subject: [PATCH] Delete `Pipfile` from root since uv is now recommended over pipenv Also: - Delete unused readme_files directory - Edit MANIFEST.in to reflect current reality - Minor updates to ruff config in pyproject.toml to remove outdated stuff --- MANIFEST.in | 7 ++- Pipfile | 33 ------------- pyproject.toml | 4 +- readme_files/shout_out.csv | 14 ------ readme_files/shoutout.txt | 95 -------------------------------------- 5 files changed, 4 insertions(+), 149 deletions(-) delete mode 100644 Pipfile delete mode 100644 readme_files/shout_out.csv delete mode 100644 readme_files/shoutout.txt diff --git a/MANIFEST.in b/MANIFEST.in index cb4c4508..5ff97f8b 100644 --- a/MANIFEST.in +++ b/MANIFEST.in @@ -1,9 +1,8 @@ -include LICENSE README.md CHANGELOG.md noxfile.py tasks.py Pipfile +include LICENSE README.md CHANGELOG.md mkdocs.yml pyproject.toml tasks.py recursive-include examples * recursive-include tests * recursive-include docs * prune .github -prune docs/_build -prune docs/.nox -exclude .github .gitignore azure-pipelines.yml +prune build +exclude .github .gitignore .readthedocs.yaml global-exclude htmlcov/** .coverage* __pycache__/** .gitignore diff --git a/Pipfile b/Pipfile deleted file mode 100644 index b0ba2c0c..00000000 --- a/Pipfile +++ /dev/null @@ -1,33 +0,0 @@ -[[source]] -name = "pypi" -url = "https://pypi.org/simple" -verify_ssl = true - -[packages] -pyperclip = "*" -setuptools = "*" -wcwidth = "*" - -[dev-packages] -build = "*" -cmd2 = { editable = true, path = "." } -cmd2_ext_test = { editable = true, path = "plugins/ext_test" } -codecov = "*" -gnureadline = { version = "*", sys_platform = "== 'darwin'" } -invoke = "*" -ipython = "*" -mypy = "*" -pyreadline3 = { version = ">=3.4", sys_platform = "== 'win32'" } -pytest = "*" -pytest-cov = "*" -pytest-mock = "*" -ruff = "*" -setuptools-scm = "*" -mkdocs-include-markdown-plugin = "*" -mkdocs-macros-plugin = "*" -mkdocs-material = "*" -mkdocstrings= {version = "*", extras = ["python"]} -twine = ">=1.11" - -[pipenv] -allow_prereleases = true diff --git a/pyproject.toml b/pyproject.toml index cb14d536..4590514f 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -176,7 +176,7 @@ select = [ "ERA", # eradicate (warn about commented-out code) "EXE", # flake8-executable (warn about files with a shebang present that aren't executable or vice versa) "F", # Pyflakes (a bunch of common warnings for things like unused imports, imports shadowed by variables, etc) - "FA", # flake8-future-annotations (warn if certain from __future__ imports are used but missing) + # "FA", # flake8-future-annotations (warn if certain from __future__ imports are used but missing) # "FAST", # FastAPI specific warnings # "FBT", # flake8-boolean-trap (force all boolean arguments passed to functions to be keyword arguments and not positional) "FIX", # flake8-fixme (warn about lines containing FIXME, TODO, XXX, or HACK) @@ -233,7 +233,6 @@ ignore = [ "E111", # Conflicts with ruff format "E114", # Conflicts with ruff format "E117", # Conflicts with ruff format - "FA100", # Adding from __future__ import annotations screws up cmd2 because of how use inspect to validate type annotations at runtime "ISC002", # Conflicts with ruff format "Q000", # Conflicts with ruff format "Q001", # Conflicts with ruff format @@ -243,7 +242,6 @@ ignore = [ "TRY003", # Avoid specifying long messages outside the exception class (force custom exceptions for everything) "UP007", # Use X | Y for type annotations (requires Python 3.10+) "UP017", # Use datetime.UTC alias (requires Python 3.11+) - "UP036", # Version block is outdated for minimum Python version (requires ruff target_version set to minimum supported) "UP038", # Use X | Y in {} call instead of (X, Y) - deprecated due to poor performance (requires Python 3.10+) "W191", # Conflicts with ruff format ] diff --git a/readme_files/shout_out.csv b/readme_files/shout_out.csv deleted file mode 100644 index ddc36fdf..00000000 --- a/readme_files/shout_out.csv +++ /dev/null @@ -1,14 +0,0 @@ -Application Name, Description -[Jok3r](http://www.jok3r-framework.com),Network & Web Pentest Automation Framework -[CephFS Shell](https://github.com/ceph/ceph),'[Ceph](https://ceph.com/) is a distributed object, block, and file storage platform' -[psiTurk](https://psiturk.org),An open platform for science on Amazon Mechanical Turk -[Poseidon](https://github.com/CyberReboot/poseidon),Leverages software-defined networks (SDNs) to acquire and then feed network traffic to a number of machine learning techniques. -[Unipacker](https://github.com/unipacker/unipacker),Automatic and platform-independent unpacker for Windows binaries based on emulation -[tomcatmanager](https://github.com/tomcatmanager/tomcatmanager),A command line tool and python library for managing a tomcat server -[Expliot](https://gitlab.com/expliot_framework/expliot),Internet of Things (IoT) exploitation framework -[mptcpanalyzer](),Tool to help analyze mptcp pcaps -[clanvas](https://github.com/marklalor/clanvas),Command-line client for Canvas by Instructure - -Oldies but goodie,, -[JSShell](https://github.com/Den1al/JSShell),An interactive multi-user web JavaScript shell. -[FLASHMINGO](https://github.com/fireeye/flashmingo),Automatic analysis of SWF files based on some heuristics. Extensible via plugins. diff --git a/readme_files/shoutout.txt b/readme_files/shoutout.txt deleted file mode 100644 index ea3f8ec1..00000000 --- a/readme_files/shoutout.txt +++ /dev/null @@ -1,95 +0,0 @@ -Name: -Source Code: -Status: -Description: -Genre: - - - -Name: Microsoft/ Azure Counterfit -Source Code: https://github.com/Azure/counterfit -Status: Active -Description: Counterfit is a command-line tool and generic automation layer for assessing the security of machine learning systems. -Genre: Security - -Name: MQTT-Pwn -Source Code: https://github.com/akamai-threat-research/mqtt-pwn -Status: Stale -Description: MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations -Genre: Security - -Name: OpenBeacon2 -Source Code: https://github.com/etherkit/OpenBeacon2 -Description: Commandline tool for interfacing with hardware in the [OpenBeacon](https://www.openbeacon.org/) environment. -Genre: Utility - -Name: GreenWaves-Technologies/gap_sdk -Source Code: https://github.com/GreenWaves-Technologies/gap_sdk -Status: Active -Description: GAP SDK allows you to compile and execute applications on the GAP IoT Application Processor. -Genre: Utility, IoT - -Name: JSShell -Source Code: https://github.com/Den1al/JSShell -Status: Unknown -Description: An interactive multi-user web based javascript shell. -Genre: Utility, Web - - -Name: pyOS -Source Code: https://github.com/muhrin/pyos -Status: Active -Description: A fresh way to interact with your python objects as though they were files on your filesystem. -Genre: ???? - -Name: darkcode357/thg-framework -Source Code: https://github.com/darkcode357/thg-framework -Status: Inactive -Description: THG is a framework for security testing and ctf games, but it can be used as a library for exploit development. -Genre: Security - - -Name: qsecure-labs/Overloard -Source Code: https://github.com/qsecure-labs/overlord -Status: Active -Description: Overlord provides a python-based console CLI which is used to build Red Teaming infrastructure in an automated way. -Genre: Security - - -Name: seemoo-lab/internalblue -Source Code: https://github.com/seemoo-lab/internalblue -Status: Active -Description: Bluetooth experimentation framework for Broadcom and Cypress chips. -Genre: utility - -Name: icl-rocketry/Avionics -Source Code: https://github.com/icl-rocketry/Avionics -Status: Active -Description: The main repository for hardware and software associated with the Ricardo Avionics Ecosystem. -Genre: Utility - - -Name: jonny1102/nmap-parse -Source Code: https://github.com/jonny1102/nmap-parse -Status: Inactive -Description: Command line nmap XML parser -Genre: Security - -Name: cybiere/baboossh -Source Code: https://github.com/cybiere/baboossh -Status: Active -Description:SSH spreading made easy for red teams in a hurry -Genre: Security - -Name: qilingframework/qiling -Source Code: https://github.com/qilingframework/qiling -Status: Active -Description: Qiling Advanced Binary Emulation Framework -Genre: Security - - -Name: JohnHammond/katana -Source Code: https://github.com/JohnHammond/katana -Status: Active -Description: Katana - Automatic CTF Challenge Solver in Python3 -Genre: Security