File: control

package info (click to toggle)
brutespray 1.8.1-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 252 kB
  • sloc: python: 461; makefile: 8
file content (23 lines) | stat: -rw-r--r-- 971 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Source: brutespray
Section: net
Priority: optional
Rules-Requires-Root: no
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: Stephane Neveu <stefneveu@gmail.com>,
           Carlos Henrique Lima Melara <charlesmelara@riseup.net>
Build-Depends: debhelper-compat (= 13), dh-python, python3, ronn
Homepage: https://github.com/x90skysn3k/brutespray
Standards-Version: 4.6.2
Vcs-Git: https://salsa.debian.org/pkg-security-team/brutespray.git
Vcs-Browser: https://salsa.debian.org/pkg-security-team/brutespray

Package: brutespray
Depends: medusa, ${misc:Depends}, ${python3:Depends}
Recommends: nmap
Architecture: all
Description: Python bruteforce tool
 This Python script takes nmap GNMAP/XML output, newline separated JSON,
 Nexpose `XML Export` output or Nessus `.nessus` exports and automatically
 brute-forces services with default credentials using Medusa.
 .
 BruteSpray can even find non-standard ports by using the -sV inside Nmap.