%FILENAME%
delldrac-0.1-2-any.pkg.tar.xz

%NAME%
delldrac

%VERSION%
0.1-2

%DESC%
Rid_enum is a null session RID cycle attack for brute forcing domain controllers.

%GROUPS%
archstrike
archstrike-scanners

%CSIZE%
5464

%ISIZE%
35840

%MD5SUM%
38e027346ca8c11f3ad274025a44b6a6

%SHA256SUM%
746891df6bf2e3aa13fff9e5e7e58154f900f34f1533c2b63d1b81d0bb2d5c3c

%PGPSIG%
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

%URL%
https://www.trustedsec.com/september-2012/owning-dell-drac-awesome-hack/

%LICENSE%
custom

%ARCH%
any

%BUILDDATE%
1490354207

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%DEPENDS%
python2

