%FILENAME%
gwt-toolset-git-1:20120831.r7.f27a5aa-2-any.pkg.tar.xz

%NAME%
gwt-toolset-git

%VERSION%
1:20120831.r7.f27a5aa-2

%DESC%
analyzes the obfuscated Javascript produced by Google Web Toolkit (GWT) applications in order to enumerate all services and method calls

%GROUPS%
archstrike
archstrike-webapps
archstrike-recon

%CSIZE%
1086628

%ISIZE%
1340416

%MD5SUM%
a2c0e66847bfc99df4bc1ee8d1b73685

%SHA256SUM%
d749fe930d016e53ae6d88a8f4b5286216a07265744d52683b492888fbd3d236

%PGPSIG%
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

%URL%
http://www.gdssecurity.com/l/t/d.php?k=GwtEnum

%LICENSE%
GPL3

%ARCH%
any

%BUILDDATE%
1490469987

%PACKAGER%
Kevin MacMartin <prurigro@archstrike.org>

%REPLACES%
gwtenum

%CONFLICTS%
gwtenum

%PROVIDES%
gwtenum

%DEPENDS%
python2

%MAKEDEPENDS%
git

