Skip to content

Commit

Permalink
Fix tools
Browse files Browse the repository at this point in the history
  • Loading branch information
D3vil0p3r committed Jan 19, 2025
1 parent 1514d06 commit 459fe5e
Show file tree
Hide file tree
Showing 2,531 changed files with 3,908 additions and 3,112 deletions.
3 changes: 2 additions & 1 deletion packages/archive/broken/0d1n/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,8 @@ pkgname=0d1n
pkgver=6.ccab505
pkgrel=1
epoch=1
groups=('athena' 'athena-webapp' 'athena-fuzzer' 'athena-scanner')
groups=('role-webpentester' 'role-redteamer' 'athena' 'athena-webapp'
'athena-fuzzer' 'athena-scanner')
pkgdesc='Web security tool to make fuzzing at HTTP inputs, made in C with libCurl.'
arch=('x86_64' 'aarch64')
url='https://gitlab.com/snake-security/0d1n'
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/aimage/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ arch=('x86_64' 'aarch64')
url='http://pkgs.fedoraproject.org/repo/pkgs/aimage/'
license=('custom')
depends=('afflib' 'openssl' 'readline')
groups=('athena' 'athena-forensic')
groups=('role-forensic' 'athena' 'athena-forensic')
source=("http://pkgs.fedoraproject.org/repo/pkgs/aimage/aimage-$pkgver.tar.gz/07a11d653cdd1d7a5aefe4d99cdbd408/aimage-$pkgver.tar.gz")
sha512sums=('dc26f0e4ce1d336390aa0cc3ebeeb3388435ff2992b2f25217ad7fe61e05231f51359d5f8917b8a157fdaf6294903bb6c7e019ab3e116703c210ab93907a76db')

Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/apacket/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,8 @@
pkgname=apacket
pkgver=55.10cb530
pkgrel=1
groups=('athena' 'athena-networking' 'athena-sniffer')
groups=('role-redteamer' 'role-network' 'athena' 'athena-networking'
'athena-sniffer')
pkgdesc='Sniffer syn and backscatter packets.'
arch=('x86_64' 'aarch64')
url='https://github.com/cys3c/apacket'
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/aws-extender-cli/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,8 @@
pkgname=aws-extender-cli
pkgver=17.a351154
pkgrel=4
groups=('athena' 'athena-scanner' 'athena-webapp')
groups=('role-webpentester' 'role-redteamer' 'athena' 'athena-scanner'
'athena-webapp')
pkgdesc='Script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common misconfiguration issues.'
arch=('any')
url='https://github.com/VirtueSecurity/aws-extender-cli'
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/bamf-framework/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ pkgdesc='A modular framework designed to be a platform to launch attacks against
url='https://github.com/bwall/BAMF'
arch=('any')
license=('MIT')
groups=('athena' 'athena-malware' 'athena-defensive')
groups=('role-malware' 'athena' 'athena-malware' 'athena-defensive')
depends=('python2' 'python2-yara' 'yara' 'python2-simplejson' 'python2-pycurl'
'python2-pygeoip')
makedepends=('git')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/bashscan/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ pkgname=bashscan
pkgver=94.80c066c
pkgrel=1
pkgdesc='A port scanner built to utilize /dev/tcp for network and service discovery.'
groups=('athena' 'athena-scanner')
groups=('role-redteamer' 'athena' 'athena-scanner')
arch=('any')
url='https://github.com/astryzia/BashScan'
license=('MIT')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/brut3k1t/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=brut3k1t
pkgver=104.793821f
pkgrel=4
groups=('athena' 'athena-cracker')
groups=('role-redteamer' 'role-cracker' 'athena' 'athena-cracker')
arch=('any')
pkgdesc='Brute-force attack that supports multiple protocols and services.'
url='https://github.com/ex0dus-0x/brut3k1t'
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/brutus/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ pkgver=2
pkgrel=6
pkgdesc='One of the fastest, most flexible remote password crackers you can get your hands on.'
url='http://www.hoobie.net/brutus/'
groups=('athena' 'athena-windows' 'athena-cracker')
groups=('role-redteamer' 'role-cracker' 'athena' 'athena-windows'
'athena-cracker')
license=('custom')
arch=('any')
source=('http://www.hoobie.net/brutus/brutus-aet2.zip')
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/casefile/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,8 @@
pkgname=casefile
pkgver=1.0.1
pkgrel=8
groups=('athena' 'athena-forensic' 'athena-recon' 'athena-scanner')
groups=('role-redteamer' 'role-osint' 'role-forensic' 'athena' 'athena-forensic'
'athena-recon' 'athena-scanner')
pkgdesc="The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information"
arch=('any')
url='http://www.paterva.com/web6/products/casefile.php'
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/checkpwd/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ pkgname=checkpwd
pkgver=1.23
pkgrel=6
pkgdesc='Oracle Password Checker (Cracker).'
groups=('athena' 'athena-cracker')
groups=('role-redteamer' 'role-cracker' 'athena' 'athena-cracker')
url='http://www.red-database-security.com/software/checkpwd.html'
license=('GPL-1.0-or-later')
arch=('x86_64' 'aarch64')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/clamscanlogparser/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=clamscanlogparser
pkgver=1
pkgrel=3
groups=('athena' 'athena-malware')
groups=('role-malware' 'athena' 'athena-malware')
pkgdesc='This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection.'
url='http://magikh0e.xyz/'
arch=('any')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/cryptonark/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ pkgname=cryptonark
pkgver=0.5.7
pkgrel=3
pkgdesc='SSL security checker.'
groups=('athena' 'athena-crypto')
groups=('role-cracker' 'athena' 'athena-crypto')
arch=('any')
url='https://blog.techstacks.com/cryptonark.html'
license=('GPL-1.0-or-later')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/dark-dork-searcher/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ pkgver=1.0
pkgrel=5
pkgdesc='Dark-Dork Searcher.'
url='http://rafale.org/~mattoufoutu/darkc0de.com/c0de/c/'
groups=('athena' 'athena-windows' 'athena-scanner')
groups=('role-redteamer' 'athena' 'athena-windows' 'athena-scanner')
license=('custom:unknown')
arch=('any')
source=("$pkgname.rar::http://rafale.org/~mattoufoutu/darkc0de.com/c0de/c/Dark-Dork_Searcher.rar")
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/dorkme/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ pkgname=dorkme
pkgver=57.0a7017a
pkgrel=3
pkgdesc='Tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities.'
groups=('athena' 'athena-scanner')
groups=('role-redteamer' 'athena' 'athena-scanner')
arch=('any')
url='https://github.com/blueudp/DorkMe'
license=('GPL-3.0-or-later')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/evilmaid/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ pkgver=1.01
pkgrel=3
pkgdesc='TrueCrypt loader backdoor to sniff volume password.'
url='http://theinvisiblethings.blogspot.com'
groups=('athena' 'athena-cracker')
groups=('role-redteamer' 'role-cracker' 'athena' 'athena-cracker')
license=('custom:unknown')
arch=('any')
source=("http://invisiblethingslab.com/resources/evilmaid/evilmaidusb-$pkgver.img")
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/expimp-lookup/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,8 @@
pkgname=expimp-lookup
pkgver=4.79a96c7
pkgrel=2
groups=('athena' 'athena-binary' 'athena-recon')
groups=('role-redteamer' 'role-osint' 'role-malware' 'athena' 'athena-binary'
'athena-recon')
pkgdesc='Looks for all export and import names that contain a specified string in all Portable Executable in a directory tree.'
arch=('any')
url='https://github.com/tr3w/ExpImp-Lookup'
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/findmyiphone/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,8 @@ pkgname=findmyiphone
pkgver=19.aef3ac8
pkgrel=1
pkgdesc='Locates all devices associated with an iCloud account'
groups=('athena' 'athena-mobile' 'athena-recon')
groups=('role-redteamer' 'role-osint' 'role-mobile' 'athena' 'athena-mobile'
'athena-recon')
arch=('any')
url='https://github.com/manwhoami/findmyiphone'
license=('custom:unknown')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/fprotlogparser/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=fprotlogparser
pkgver=1
pkgrel=4
groups=('athena' 'athena-malware')
groups=('role-malware' 'athena' 'athena-malware')
pkgdesc='This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection.'
url='http://magikh0e.xyz/'
arch=('any')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/fuzzball2/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=fuzzball2
pkgver=0.7
pkgrel=3
groups=('athena' 'athena-fuzzer')
groups=('role-webpentester' 'role-redteamer' 'athena' 'athena-fuzzer')
pkgdesc='A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice.'
arch=('x86_64' 'aarch64')
url='http://nologin.org/'
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/gpredict/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ pkgver=1646.098e376
pkgrel=1
pkgdesc='A real-time satellite tracking and orbit prediction application.'
arch=('x86_64' 'aarch64')
groups=('athena' 'athena-radio' 'athena-scanner')
groups=('role-redteamer' 'role-network' 'athena' 'athena-radio'
'athena-scanner')
license=('GPL-1.0-or-later')
url='http://gpredict.oz9aec.net/'
depends=('curl' 'gtk3' 'glib2' 'grig' 'goocanvas' 'hamlib')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/grabing/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ pkgname=grabing
pkgver=11.9c1aa6c
pkgrel=2
pkgdesc='Counts all the hostnames for an IP address.'
groups=('athena' 'athena-recon')
groups=('role-redteamer' 'role-osint' 'athena' 'athena-recon')
arch=('any')
url='https://github.com/black-brain/graBing'
license=('GPL-3.0-or-later')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/grabitall/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ pkgver=1.1
pkgrel=3
pkgdesc='Performs traffic redirection by sending spoofed ARP replies.'
url='http://ntsecurity.nu/toolbox/grabitall/'
groups=('athena' 'athena-windows' 'athena-spoof'
groups=('role-redteamer' 'role-network' 'athena' 'athena-windows' 'athena-spoof'
'athena-networking')
license=('custom:unknown')
arch=('any')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/halcyon/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=halcyon
pkgver=0.1
pkgrel=4
groups=('athena' 'athena-recon')
groups=('role-redteamer' 'role-osint' 'athena' 'athena-recon')
pkgdesc='A repository crawler that runs checksums for static files found within a given git repository.'
url='http://www.blackhatlibrary.net/Halcyon'
arch=('any')
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/hubbit-sniffer/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,8 @@
pkgname=hubbit-sniffer
pkgver=74.460ecf8
pkgrel=6
groups=('athena' 'athena-sniffer' 'athena-wireless')
groups=('role-redteamer' 'role-network' 'athena' 'athena-sniffer'
'athena-wireless')
pkgdesc='Simple application that listens for WIFI-frames and records the mac-address of the sender and posts them to a REST-api.'
arch=('any')
url='https://github.com/cthit/hubbIT-sniffer'
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/hyde/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,8 @@
pkgname=hyde
pkgver=16.0931514
pkgrel=1
groups=('athena' 'athena-networking' 'athena-dos')
groups=('role-redteamer' 'role-network' 'role-dos' 'athena' 'athena-networking'
'athena-dos')
pkgdesc='Just another tool in C to do DDoS (with spoofing).'
arch=('x86_64' 'aarch64')
url='https://github.com/CoolerVoid/Hyde'
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/iisbruteforcer/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=iisbruteforcer
pkgver=16
pkgrel=1
groups=('athena' 'athena-cracker')
groups=('role-redteamer' 'role-cracker' 'athena' 'athena-cracker')
arch=('x86_64' 'aarch64')
pkgdesc="HTTP authentication cracker. It's a tool that launchs an online dictionary attack to test for weak or simple passwords against protected areas on an IIS Web server."
url='http://www.open-labs.org/'
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/intrace/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=intrace
pkgver=1.5
pkgrel=4
groups=('athena' 'athena-recon')
groups=('role-redteamer' 'role-osint' 'athena' 'athena-recon')
pkgdesc='Traceroute-like application piggybacking on existing TCP connections.'
url='https://intrace.googlecode.com'
arch=('x86_64' 'aarch64')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/ircsnapshot/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=ircsnapshot
pkgver=94.cb02a85
pkgrel=2
groups=('athena' 'athena-recon' 'athena-scanner')
groups=('role-redteamer' 'role-osint' 'athena' 'athena-recon' 'athena-scanner')
pkgdesc='Tool to gather information from IRC servers.'
arch=('any')
url='https://github.com/bwall/ircsnapshot'
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/jondo/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,8 @@ pkgname=jondo
pkgver=00.20.001
pkgrel=1
pkgdesc='Redirects internet traffic trough a mix of proxy servers to hide the origin of the requests.'
groups=('athena' 'athena-proxy' 'athena-networking')
groups=('role-redteamer' 'role-network' 'athena' 'athena-proxy'
'athena-networking')
arch=('any')
license=('BSD')
url='https://anonymous-proxy-servers.net/'
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/justdecompile/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ pkgver=2015
pkgrel=1
pkgdesc='The decompilation engine of JustDecompile.'
url='https://github.com/cdfpaz/JustDecompileEngine'
groups=('athena' 'athena-windows' 'athena-decompiler' 'athena-binary' 'athena-reversing')
groups=('role-redteamer' 'role-mobile' 'role-malware' 'athena' 'athena-windows'
'athena-decompiler' 'athena-binary' 'athena-reversing')
license=('Apache-2.0')
arch=('any')
source=("$pkgname-R${pkgver}SP1.zip::https://github.com/cdfpaz/JustDecompileEngine/archive/ReleaseQ1${pkgver}SP3(default).zip")
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/kerbcrack/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ pkgver=1.3d3
pkgrel=4
pkgdesc='Kerberos sniffer and cracker for Windows.'
url='http://ntsecurity.nu/toolbox/kerbcrack/'
groups=('athena' 'athena-windows' 'athena-sniffer' 'athena-cracker')
groups=('role-redteamer' 'role-network' 'role-cracker' 'athena' 'athena-windows'
'athena-sniffer' 'athena-cracker')
license=('custom:unknown')
arch=('any')
source=('http://ntsecurity.nu/downloads/kerbcrack.zip')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/leroy-jenkins/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=leroy-jenkins
pkgver=3.bdc3965
pkgrel=5
groups=('athena' 'athena-exploitation')
groups=('role-redteamer' 'athena' 'athena-exploitation')
pkgdesc='A python tool that will allow remote execution of commands on a Jenkins server and its nodes.'
url='https://github.com/captainhooligan/Leroy-Jenkins'
arch=('any')
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/lfi-autopwn/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,8 @@
pkgname=lfi-autopwn
pkgver=3.0
pkgrel=7
groups=('athena' 'athena-exploitation' 'athena-fuzzer')
groups=('role-webpentester' 'role-redteamer' 'athena' 'athena-exploitation'
'athena-fuzzer')
pkgdesc='A Perl script to try to gain code execution on a remote server via LFI.'
url='http://www.blackhatlibrary.net/Lfi_autopwn.pl'
arch=('any')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/maclookup/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ pkgname=maclookup
pkgver=0.4
pkgrel=2
epoch=1
groups=('athena' 'athena-networking')
groups=('role-redteamer' 'role-network' 'athena' 'athena-networking')
pkgdesc='Lookup MAC addresses in the IEEE MA-L/OUI public listing.'
url='https://github.com/paraxor/maclookup'
arch=('any')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/manticore/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ pkgver=0.3.7.r73.g88610053
pkgrel=1
pkgdesc='Symbolic execution tool.'
arch=('any')
groups=('athena' 'athena-binary')
groups=('role-malware' 'athena' 'athena-binary')
url='https://github.com/trailofbits/manticore'
license=('AGPL-3.0-or-later')
depends=('python' 'python-yaml' 'python-protobuf' 'python-pysha3' 'python-cbor2'
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/mdbtools/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=mdbtools
pkgver=738.823b32f
pkgrel=1
groups=('athena' 'athena-forensic')
groups=('role-forensic' 'athena' 'athena-forensic')
pkgdesc='Utilities for viewing data and exporting schema from Microsoft Access Database files.'
arch=('x86_64' 'aarch64')
url="https://github.com/evanmiller/mdbtools"
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/memimager/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ pkgver=1.0
pkgrel=3
pkgdesc='Performs a memory dump using NtSystemDebugControl.'
url='http://ntsecurity.nu/toolbox/memimager/'
groups=('athena' 'athena-windows' 'athena-forensic')
groups=('role-redteamer' 'role-forensic' 'athena' 'athena-windows'
'athena-forensic')
license=('custom:unknown')
arch=('any')
source=('http://ntsecurity.nu/downloads/memimager.exe')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/metoscan/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=metoscan
pkgver=05
pkgrel=4
groups=('athena' 'athena-webapp')
groups=('role-webpentester' 'role-redteamer' 'athena' 'athena-webapp')
pkgdesc='Tool for scanning the HTTP methods supported by a webserver.'
url='https://www.open-labs.org/'
license=('custom')
Expand Down
3 changes: 2 additions & 1 deletion packages/archive/broken/mingsweeper/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@ pkgver=1.00
pkgrel=2
pkgdesc='A network reconnaissance tool designed to facilitate large address space,high speed node discovery and identification.'
url='http://www.hoobie.net/mingsweeper/'
groups=('athena' 'athena-windows' 'athena-recon' 'athena-scanner')
groups=('role-redteamer' 'role-osint' 'athena' 'athena-windows' 'athena-recon'
'athena-scanner')
license=('custom:unknown')
arch=('any')
source=('http://www.hoobie.net/mingsweeper/minger1a5.zip')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/minimysqlator/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=minimysqlator
pkgver=0.5
pkgrel=5
groups=('athena' 'athena-exploitation')
groups=('role-redteamer' 'athena' 'athena-exploitation')
pkgdesc='A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.'
arch=('any')
url='http://www.scrt.ch/en/attack/downloads/mini-mysqlat0r'
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/morxbook/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=morxbook
pkgver=1.0
pkgrel=6
groups=('athena' 'athena-cracker')
groups=('role-redteamer' 'role-cracker' 'athena' 'athena-cracker')
pkgdesc='A password cracking tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTPS.'
url='http://www.morxploit.com/'
arch=('any')
Expand Down
2 changes: 1 addition & 1 deletion packages/archive/broken/morxbrute/PKGBUILD
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
pkgname=morxbrute
pkgver=1.01
pkgrel=8
groups=('athena' 'athena-cracker')
groups=('role-redteamer' 'role-cracker' 'athena' 'athena-cracker')
pkgdesc='A customizable HTTP dictionary-based password cracking tool written in Perl.'
url='http://www.morxploit.com/morxbrute/'
arch=('any')
Expand Down
Loading

0 comments on commit 459fe5e

Please sign in to comment.