%FILENAME%
hidattack-0.1-2-i686.pkg.tar.xz

%NAME%
hidattack

%VERSION%
0.1-2

%DESC%
HID Attack (attacking HID host implementations)

%GROUPS%
archstrike
archstrike-bluetooth

%CSIZE%
7324

%ISIZE%
35840

%MD5SUM%
22e7b7676e2570333e6c551fca08db95

%SHA256SUM%
3165a6e6366b0f46cfb3913aef450f4ec4ebb17a2356610b97181b54f660f065

%PGPSIG%
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

%URL%
http://mulliner.org/bluetooth/hidattack.php

%LICENSE%
GPL

%ARCH%
i686

%BUILDDATE%
1490339322

%PACKAGER%
Kevin MacMartin <prurigro@archstrike.org>

%DEPENDS%
bluez
openobex

%MAKEDEPENDS%
gcc

