%FILENAME%
aeskeyfind-1.0-6-x86_64.pkg.tar.xz

%NAME%
aeskeyfind

%VERSION%
1.0-6

%DESC%
A tool to find AES key in RAM

%GROUPS%
archstrike
archstrike-forensics
archstrike-crackers

%CSIZE%
6420

%ISIZE%
37888

%MD5SUM%
0b14a63922a27c1fe4c8d95be88aa038

%SHA256SUM%
0f06930b1232612036234f78abfddd402696543d2cf1da8b6fec73a8047cb8ea

%PGPSIG%
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

%URL%
http://citp.princeton.edu/memory/code

%LICENSE%
BSD

%ARCH%
x86_64

%BUILDDATE%
1464273414

%PACKAGER%
Tyler Bennett <arch3y@archstrike.org>

%DEPENDS%
glibc

