FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
ratproxy Semi-automated, largely passive web application security audit tool
1.58 security on this many watch lists=2 search for ports that depend on this port Find issues related to this port Report an issue related to this port
Maintainer: skreuzer@FreeBSD.org search for ports maintained by this maintainer
Port Added: 08 Jul 2008 21:35:48
License: not specified in port
Ratproxy is a semi-automated, largely passive web application security audit
tool. It is meant to complement active crawlers and manual proxies more
commonly used for this task, and is optimized specifically for an accurate and
sensitive detection, and automatic annotation, of potential problems and
security-relevant design patterns based on the observation of existing,
user-initiated traffic in complex web 2.0 environments.

WWW: https://github.com/codenote/ratproxy
SVNWeb : Homepage : PortsMon

To install the port: cd /usr/ports/security/ratproxy/ && make install clean
To add the package: pkg install ratproxy

PKGNAME: ratproxy

ONLY_FOR_ARCHS: nil

NOT_FOR_ARCHS: nil

distinfo:

SHA256 (ratproxy-1.58.tar.gz) = 2142d5643305713d9be7fcc82a244048076190851e697b645c49b549a7ae0725
SIZE (ratproxy-1.58.tar.gz) = 168700

There are no ports dependent upon this port


Configuration Options
     No options to configure

USES:
shebangfix ssl

Master Sites:
  1. ftp://ftp.bit.nl/openbsd/distfiles/
  2. ftp://mirror.wdc1.us.leaseweb.net/gentoo/distfiles/

Number of commits found: 9

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
23 Jan 2017 15:47:38
Original commit files touched by this commit  1.58
Revision:432239
skreuzer search for other commits by this committer
Update MASTER_SITES
14 Sep 2016 15:59:34
Original commit files touched by this commit  1.58
Revision:422140
mat search for other commits by this committer
GOOGLE_CODE has gone away.

- If a port has another upstream, remove GOOGLE_CODE
- If a port only has GOOGLE_CODE mark it BROKEN

Some ports have a local mirror configured but for security reasons, it
is not considered upstream.

Sponsored by:	Absolight
11 Sep 2016 05:00:56
Original commit files touched by this commit  1.58
Revision:421792
marino search for other commits by this committer
security/ratproxy: Add SSL flags and honor them

Approved by:	SSL blanket
25 Feb 2014 12:18:13
Original commit files touched by this commit  1.58
Revision:345976
ehaupt search for other commits by this committer
Support staging
20 Sep 2013 22:55:26
Original commit files touched by this commit  1.58
Revision:327769
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
03 Jul 2011 14:03:52
Original commit files touched by this commit  1.58
ohauer search for other commits by this committer
-remove MD5
27 May 2009 16:54:33
Original commit files touched by this commit  1.58
skreuzer search for other commits by this committer
Update to 1.58

Approved by:    wxs (mentor)
28 Mar 2009 01:16:37
Original commit files touched by this commit  1.51
skreuzer search for other commits by this committer
Change MAINTAINER on my ports to my FreeBSD email address

Approved by:    wxs (mentor)
08 Jul 2008 21:35:23
Original commit files touched by this commit  1.51
pav search for other commits by this committer
Ratproxy is a semi-automated, largely passive web application security audit
tool. It is meant to complement active crawlers and manual proxies more
commonly used for this task, and is optimized specifically for an accurate and
sensitive detection, and automatic annotation, of potential problems and
security-relevant design patterns based on the observation of existing,
user-initiated traffic in complex web 2.0 environments.

WWW: http://code.google.com/p/ratproxy/

PR:             ports/125249
Submitted by:   Steven Kreuzer <skreuzer@exit2shell.com>

Number of commits found: 9

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
xen-toolsMar 23
hostapd*Mar 22
hostapd*Mar 22
wpa_supplicant*Mar 22
wpa_supplicant*Mar 22
firefoxMar 18
hadoop2*Mar 18
irssiMar 18
mariadb100-clientMar 18
mariadb101-clientMar 18
mariadb55-clientMar 18
moodle29Mar 18
moodle29Mar 18
moodle30Mar 18
moodle30Mar 18

28 vulnerabilities affecting 69 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 28363
Broken 266
Deprecated 263
Ignore 531
Forbidden 0
Restricted 203
No CDROM 79
Vulnerable 89
Expired 17
Set to expire 258
Interactive 0
new 24 hours 3
new 48 hours19
new 7 days73
new fortnight105
new month222

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.