%FILENAME%
gwt-toolset-git-1:20120831.r7.f27a5aa-2-any.pkg.tar.xz

%NAME%
gwt-toolset-git

%VERSION%
1:20120831.r7.f27a5aa-2

%DESC%
analyzes the obfuscated Javascript produced by Google Web Toolkit (GWT) applications in order to enumerate all services and method calls

%GROUPS%
archstrike
archstrike-webapps
archstrike-recon

%CSIZE%
1086628

%ISIZE%
1340416

%MD5SUM%
6c234456193c501dcecb8ced49e5217b

%SHA256SUM%
c0f9ce7465aab682059309a8ef0ef4c3be0a20706f50e80c35e173573ec2a78d

%PGPSIG%
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

%URL%
http://www.gdssecurity.com/l/t/d.php?k=GwtEnum

%LICENSE%
GPL3

%ARCH%
any

%BUILDDATE%
1490432460

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%REPLACES%
gwtenum

%CONFLICTS%
gwtenum

%PROVIDES%
gwtenum

%DEPENDS%
python2

%MAKEDEPENDS%
git

