File: control

package info (click to toggle)
brutespray 1.6.4-1
  • links: PTS, VCS
  • area: main
  • in suites: buster
  • size: 276 kB
  • sloc: python: 337; makefile: 8
file content (23 lines) | stat: -rw-r--r-- 863 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Source: brutespray
Section: net
Priority: optional
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: NEVEU Stephane <stefneveu@gmail.com>
Build-Depends: debhelper (>= 12~), dh-python, python, ronn
Homepage: https://github.com/x90skysn3k/brutespray
Standards-Version: 4.3.0
Vcs-Git: https://salsa.debian.org/pkg-security-team/brutespray.git
Vcs-Browser: https://salsa.debian.org/pkg-security-team/brutespray

Package: brutespray
Depends: medusa,
         python-argcomplete,
         ${misc:Depends},
         ${python:Depends},
         ${shlibs:Depends}
Recommends: nmap
Architecture: all
Description: Python bruteforce tool
 This Python script takes nmap GNMAP/XML output and automatically brute-forces
 services with default credentials using Medusa.
 BruteSpray can even find non-standard ports by using the -sV inside Nmap.