%FILENAME%
pcredz-1.0.0-4-any.pkg.tar.xz

%NAME%
pcredz

%VERSION%
1.0.0-4

%DESC%
A tool that extracts credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, and more from a pcap file or from a live interface.

%GROUPS%
archstrike
archstrike-sniffers

%CSIZE%
8012

%ISIZE%
51200

%MD5SUM%
9665600879b395f10ee7591cc1251fb8

%SHA256SUM%
ff293500c5d51e0814a9497cfc4121d0fd6ecae153da93ecd377f3a5d6ebb4fc

%PGPSIG%
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

%URL%
https://github.com/lgandx/PCredz

%LICENSE%
GPL2

%ARCH%
any

%BUILDDATE%
1491930311

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%DEPENDS%
python2-pylibpcap

