%FILENAME%
interrogate-0.0.4-3-armv7h.pkg.tar.xz

%NAME%
interrogate

%VERSION%
0.0.4-3

%DESC%
A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.

%GROUPS%
archstrike
archstrike-forensics
archstrike-crackers

%CSIZE%
24512

%ISIZE%
98304

%MD5SUM%
39684e97c57cfdda8de9e1ec597638c8

%SHA256SUM%
db8583982f44fbd44156f51a500ac4b5d0cbb150c3ffa2968ed3c1e3a08c0b08

%PGPSIG%
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

%URL%
https://github.com/carmaa/interrogate

%LICENSE%
GPL3

%ARCH%
armv7h

%BUILDDATE%
1490442279

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%DEPENDS%
glibc

