[go: up one dir, main page]

File: control

package info (click to toggle)
themole 0.3-2
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, buster
  • size: 900 kB
  • sloc: python: 9,957; makefile: 2
file content (23 lines) | stat: -rw-r--r-- 990 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Source: themole
Section: web
Priority: optional
Maintainer: Raúl Benencia <rul@kalgan.cc>
Build-Depends: debhelper (>= 11), python3, dh-python
Standards-Version: 4.1.4
Homepage: https://sourceforge.net/projects/themole/
Vcs-Browser: https://salsa.debian.org/rul-guest/themole
Vcs-Git: https://salsa.debian.org/rul-guest/themole.git

Package: themole
Architecture: all
Depends: ${misc:Depends}, ${python3:Depends}, python3, python3-lxml, python3-chardet
Description: automatic SQL injection exploitation tool
 The Mole is an automatic SQL Injection exploitation tool.
 Only by providing a vulnerable URL and a valid string on the
 site it can detect the injection and exploit it, either by
 using the union technique or a boolean query based technique.
 .
 The Mole uses a command based interface, allowing the user
 to indicate the action he wants to perform easily. The CLI also
 provides auto-completion on both commands and command arguments,
 making the user type as less as possible.