%FILENAME%
elidecode-git-20160618.r48-5-x86_64.pkg.tar.xz

%NAME%
elidecode-git

%VERSION%
20160618.r48-5

%DESC%
A tool to decode obfuscated shellcodes using the unicorn-engine for the emulation and the capstone-engine to print the asm code

%GROUPS%
archstrike
archstrike-debugging
archstrike-analysis
archstrike-reverse

%CSIZE%
17232

%ISIZE%
78848

%MD5SUM%
cc9bb45b0096d319bb4c346bb40e4295

%SHA256SUM%
7b61c8c840603a2e749d91a3c59ecf618b668da42559e2f22599ee4425ecc981

%PGPSIG%
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

%URL%
https://github.com/DeveloppSoft/EliDecode

%LICENSE%
GPL3

%ARCH%
x86_64

%BUILDDATE%
1489985700

%PACKAGER%
Kevin MacMartin <prurigro@archstrike.org>

%DEPENDS%
capstone
unicorn
python2
bash
python2-unicorn

%MAKEDEPENDS%
git

