Source: cowpatty
Section: net
Priority: optional
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: Samuel Henrique <samueloph@debian.org>
Build-Depends: debhelper-compat (= 13),
               libpcap-dev,
               libssl-dev
Standards-Version: 4.5.0
Rules-Requires-Root: no
Homepage: https://www.willhackforsushi.com/?page_id=50
Vcs-Browser: https://salsa.debian.org/pkg-security-team/cowpatty
Vcs-Git: https://salsa.debian.org/pkg-security-team/cowpatty.git

Package: cowpatty
Architecture: any
Depends: ${misc:Depends},
         ${shlibs:Depends}
Description: Brute-force WPA dictionary attack
 If you are auditing WPA-PSK or WPA2-PSK networks, you can use
 this tool to identify weak passphrases that were used to generate the
 PMK.  Supply a libpcap capture file that includes the 4-way handshake, a
 dictionary file of passphrases to guess with, and the SSID for the
 network.
