[62750] trunk/dports/PortIndex

portindex at macports.org portindex at macports.org
Fri Jan 15 12:54:35 PST 2010


Revision: 62750
          http://trac.macports.org/changeset/62750
Author:   portindex at macports.org
Date:     2010-01-15 12:54:34 -0800 (Fri, 15 Jan 2010)
Log Message:
-----------

Total number of ports parsed:	6513 
Ports successfully parsed:	6513	 
Ports failed:			0

Modified Paths:
--------------
    trunk/dports/PortIndex

Modified: trunk/dports/PortIndex
===================================================================
--- trunk/dports/PortIndex	2010-01-15 19:47:07 UTC (rev 62749)
+++ trunk/dports/PortIndex	2010-01-15 20:54:34 UTC (rev 62750)
@@ -10713,7 +10713,7 @@
 md5deep 423
 variants universal portdir security/md5deep description {Recursively compute digests on files/directories} homepage http://md5deep.sourceforge.net/ epoch 0 platforms darwin name md5deep long_description {md5deep is a cross-platform set of programs to recursively compute MD5, SHA-1, or SHA-256 message digests on an arbitrary number of files.} maintainers nomaintainer categories {security sysutils} version 3.4 revision 0
 medusa 1254
-variants {subversion postgresql universal} portdir security/medusa description {Medusa is a speedy, massively parallel, modular, login brute-forcer} homepage http://www.foofus.net/jmk/medusa/medusa.html epoch 0 platforms darwin name medusa depends_lib {port:openssl port:libssh2} long_description {Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application. Thread-based parallel testing: Brute-force testing can be performed against multiple hosts, users or passwords concurrently. Flexible user input: Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing. Modular design: Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.} maintainers {pmq openmaintainer} categories {security net} version 1.5 revision 0
+variants {subversion postgresql universal} portdir security/medusa description {Medusa is a speedy, massively parallel, modular, login brute-forcer} homepage http://www.foofus.net/jmk/medusa/medusa.html epoch 0 platforms darwin name medusa depends_lib {port:openssl port:libssh2} long_description {Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application. Thread-based parallel testing: Brute-force testing can be performed against multiple hosts, users or passwords concurrently. Flexible user input: Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing. Modular design: Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.} maintainers {pmq openmaintainer} categories {security net} version 1.5 revision 1
 metasploit2 776
 portdir security/metasploit2 description {Tools and information for security research and pentesting} homepage http://metasploit.com/ epoch 0 platforms darwin name metasploit2 depends_lib {path:bin/perl:perl5 port:p5-term-readline-gnu port:p5-net-ssleay} maintainers darkart.com:opendarwin.org long_description {The Metasploit Project goal is to provide useful information to people who perform penetration testing, IDS signature development, and exploit research. This framework was created to fill the gaps in the information publicly available on various exploitation techniques and to create a useful resource for exploit developers. The tools and information are provided for legal security research and testing purposes only.} categories security version 2.7 revision 0
 metasploit3 749
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.macosforge.org/pipermail/macports-changes/attachments/20100115/3fcd87de/attachment-0001.html>


More information about the macports-changes mailing list