%FILENAME%
elidecode-git-20160618.r48-7-i686.pkg.tar.xz

%NAME%
elidecode-git

%BASE%
elidecode-git

%VERSION%
20160618.r48-7

%DESC%
A tool to decode obfuscated shellcodes using the unicorn-engine for the emulation and the capstone-engine to print the asm code

%GROUPS%
archstrike
archstrike-debugging
archstrike-analysis
archstrike-reverse

%CSIZE%
17836

%ISIZE%
45831

%MD5SUM%
0dd44578de65f101ca42fc015192af30

%SHA256SUM%
bc1192e174533d7241d9943c5bb7c821e889a6dfdf82b12d1081936dd8932b2e

%PGPSIG%
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

%URL%
https://github.com/ETeissonniere/EliDecode

%LICENSE%
GPL3

%ARCH%
i686

%BUILDDATE%
1639059150

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%DEPENDS%
capstone
unicorn
python
bash
python-unicorn

%MAKEDEPENDS%
git

