%FILENAME%
gwt-toolset-git-1:20120831.r7.f27a5aa-2-any.pkg.tar.xz

%NAME%
gwt-toolset-git

%VERSION%
1:20120831.r7.f27a5aa-2

%DESC%
analyzes the obfuscated Javascript produced by Google Web Toolkit (GWT) applications in order to enumerate all services and method calls

%GROUPS%
archstrike
archstrike-webapps
archstrike-recon

%CSIZE%
1086676

%ISIZE%
1340416

%MD5SUM%
99bb1f596b2600c3b2c897ab2bd980a8

%SHA256SUM%
5e7fb2b7ead6a511dc0db58ab87f640f8069039ec2aeae2978790484404b5e8c

%PGPSIG%
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

%URL%
http://www.gdssecurity.com/l/t/d.php?k=GwtEnum

%LICENSE%
GPL3

%ARCH%
any

%BUILDDATE%
1490335955

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%REPLACES%
gwtenum

%CONFLICTS%
gwtenum

%PROVIDES%
gwtenum

%DEPENDS%
python2

%MAKEDEPENDS%
git

