%FILENAME%
gwt-toolset-git-1:20120831.r7.f27a5aa-2-any.pkg.tar.xz

%NAME%
gwt-toolset-git

%VERSION%
1:20120831.r7.f27a5aa-2

%DESC%
analyzes the obfuscated Javascript produced by Google Web Toolkit (GWT) applications in order to enumerate all services and method calls

%GROUPS%
archstrike
archstrike-webapps
archstrike-recon

%CSIZE%
1086592

%ISIZE%
1340416

%MD5SUM%
1121ed417086266ac585734bceadc92a

%SHA256SUM%
88dcba1ff11220b18adeaa15433f823673ca69937bb041a645b8f1ddccebbd57

%PGPSIG%
iQIzBAABCAAdFiEEnV8cBR0UaEPNpIWL3mSCXny8DVEFAljUxqAACgkQ3mSCXny8DVFfHg//c6+CSEmomksiuJJ/NNJmoSA5A2nSHZ8XhBI3ilLEBByevWkzX1fbQAnkK1d/STh3Uz4KsT4gALsDJP+yfyn7YMIfHUmZL8gBTkgEB8f1XV4xma/YZ6ZZg8Y1af6yzb8oANqbJSLt+wQOe4F3b4Wr83HJ7Xv8viR9VMGwRVakxwb030k92UiqI01KLdQ5pe+6KvX9rKw5enUMpfTsHzr7dxP2ey7VFeIyhWeRRtguE6HaJsW6FeIQIYXqQvI+oEN2ew4Un/oKrYvCdE1tC3oZ6ZHYw+/ulEHHaIs1+wWPG4a+VTxlT8Om7Ek8uEVVjnuhNueBIHfhyj1+jcX9lTYJJRM82+jaaoR+C55xTOym7OtgIcywSRB1giEwoEbwOg2quDt7gedj0yxKga5BtAPnGx07+/MmyneOshcotJzIYoCmrK7uhhZweegjPZHIsn8kk9c3lkXvWcvA39pvIet3cUo6nVZwzIdISryDodcjrnhEw1RdvkebwQHTZoZZOEAFhen7RfXY5g1Ze+PqCnJ7vI4twdXZBXZjgn5rBmO1qdadqzO1OwNnJju2QHZ+DSeDBMtyGdAbD3dQ/eYRiL6v+SeDm6BQjgERuxYbTfmBpOM33fkcMSeWF9sFucbOWH0C40axPtC+YHYFevZdzxhNqOz9Q6FjumTGzWxQrzX5vBc=

%URL%
http://www.gdssecurity.com/l/t/d.php?k=GwtEnum

%LICENSE%
GPL3

%ARCH%
any

%BUILDDATE%
1490339486

%PACKAGER%
Kevin MacMartin <prurigro@archstrike.org>

%REPLACES%
gwtenum

%CONFLICTS%
gwtenum

%PROVIDES%
gwtenum

%DEPENDS%
python2

%MAKEDEPENDS%
git

