File: control

package info (click to toggle)
bully 1.4.00-2
  • links: PTS, VCS
  • area: main
  • in suites: bookworm, forky, sid, trixie
  • size: 2,320 kB
  • sloc: ansic: 44,954; makefile: 156
file content (22 lines) | stat: -rw-r--r-- 1,034 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Source: bully
Section: net
Priority: optional
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: Karthik <kskarthik@disroot.org>
Build-Depends: debhelper-compat (= 13), libpcap-dev, libssl-dev, liblua5.3-dev
Standards-Version: 4.6.0
Rules-Requires-Root: no
Homepage: https://github.com/kimocoder/bully
Vcs-Git: https://salsa.debian.org/pkg-security-team/bully.git
Vcs-Browser: https://salsa.debian.org/pkg-security-team/bully

Package: bully
Architecture: any
Depends: ${shlibs:Depends}, ${misc:Depends}, pixiewps, aircrack-ng
Description: Implementation of the WPS brute force attack, written in C
 Bully is a new implementation of the WPS brute force attack, written in C. It
 is conceptually identical to other programs, in that it exploits the (now well
 known) design flaw in the WPS specification. It has several advantages over
 the original reaver code. These include fewer dependencies, improved memory
 and cpu performance, correct handling of endianness, and a more robust set of
 options.