%FILENAME%
interrogate-0.0.4-3-x86_64.pkg.tar.xz

%NAME%
interrogate

%VERSION%
0.0.4-3

%DESC%
A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.

%GROUPS%
archstrike
archstrike-forensics
archstrike-crackers

%CSIZE%
26348

%ISIZE%
99328

%MD5SUM%
cffd981816bad47a2642448469224aaf

%SHA256SUM%
3fa05954b5f24a4382088e2da49dd31e3f12d40c3d64df2121829fa921a0d060

%PGPSIG%
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

%URL%
https://github.com/carmaa/interrogate

%LICENSE%
GPL3

%ARCH%
x86_64

%BUILDDATE%
1490478428

%PACKAGER%
Kevin MacMartin <prurigro@archstrike.org>

%DEPENDS%
glibc

