%FILENAME%
interrogate-0.0.4-3-armv6h.pkg.tar.xz

%NAME%
interrogate

%VERSION%
0.0.4-3

%DESC%
A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.

%GROUPS%
archstrike
archstrike-forensics
archstrike-crackers

%CSIZE%
24948

%ISIZE%
98304

%MD5SUM%
d4281885b5080752de91034e1544718c

%SHA256SUM%
79abe63d9fd7bfd2098c488c655af9e3a19d85c298c7ccd0ebe2f4e742fdb6b8

%PGPSIG%
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

%URL%
https://github.com/carmaa/interrogate

%LICENSE%
GPL3

%ARCH%
armv6h

%BUILDDATE%
1490347727

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%DEPENDS%
glibc

