%FILENAME%
elidecode-git-20160618.r48-7-x86_64.pkg.tar.xz

%NAME%
elidecode-git

%BASE%
elidecode-git

%VERSION%
20160618.r48-7

%DESC%
A tool to decode obfuscated shellcodes using the unicorn-engine for the emulation and the capstone-engine to print the asm code

%GROUPS%
archstrike
archstrike-debugging
archstrike-analysis
archstrike-reverse

%CSIZE%
17796

%ISIZE%
45831

%MD5SUM%
b807868ff2364316bf6aecb25ddd6c3c

%SHA256SUM%
81ecd82a209c322e33951bb21c58add293d8cface6cb8260d1509fd66be1f53d

%PGPSIG%
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

%URL%
https://github.com/ETeissonniere/EliDecode

%LICENSE%
GPL3

%ARCH%
x86_64

%BUILDDATE%
1639059202

%PACKAGER%
Kevin MacMartin <prurigro@archstrike.org>

%DEPENDS%
capstone
unicorn
python
bash
python-unicorn

%MAKEDEPENDS%
git

