%FILENAME%
delldrac-0.1-2-any.pkg.tar.xz

%NAME%
delldrac

%VERSION%
0.1-2

%DESC%
Rid_enum is a null session RID cycle attack for brute forcing domain controllers.

%GROUPS%
archstrike
archstrike-scanners

%CSIZE%
5452

%ISIZE%
35840

%MD5SUM%
804453e0fe5140e29b3009c8812e69a6

%SHA256SUM%
3f9774379f2e6030940b7ecb5f3500687a4c112f0f250033a8d907e13d9da0f0

%PGPSIG%
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

%URL%
https://www.trustedsec.com/september-2012/owning-dell-drac-awesome-hack/

%LICENSE%
custom

%ARCH%
any

%BUILDDATE%
1490470899

%PACKAGER%
Kevin MacMartin <prurigro@archstrike.org>

%DEPENDS%
python2

