File: control

package info (click to toggle)
brutespray 1.6.8-1
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 248 kB
  • sloc: python: 374; makefile: 8
file content (23 lines) | stat: -rw-r--r-- 867 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Source: brutespray
Section: net
Priority: optional
Rules-Requires-Root: no
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: Stephane Neveu <stefneveu@gmail.com>
Build-Depends: debhelper-compat (= 12), dh-python, python3, ronn
Homepage: https://github.com/x90skysn3k/brutespray
Standards-Version: 4.5.0
Vcs-Git: https://salsa.debian.org/pkg-security-team/brutespray.git
Vcs-Browser: https://salsa.debian.org/pkg-security-team/brutespray

Package: brutespray
Depends: medusa,
         python3-argcomplete,
         ${misc:Depends},
         ${python3:Depends}
Recommends: nmap
Architecture: all
Description: Python bruteforce tool
 This Python script takes nmap GNMAP/XML output and automatically brute-forces
 services with default credentials using Medusa.
 BruteSpray can even find non-standard ports by using the -sV inside Nmap.